Results 61 to 70 of about 78,722 (281)

Data Security of Encrypted Data Using Hash-Based Message Authentication Code (HMAC) and T9-Based Data Conversion

open access: yesPUP Journal of Science and Technology, 2018
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj   +1 more source

A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems

open access: yes, 2015
Evidence of signatures associated with cryptographic modes of operation is established. Motivated by some analogies between cryptographic and dynamical systems, in particular with chaos theory, we propose an algorithm based on Lyapunov exponents of ...
Baetens, Jan M.   +4 more
core   +1 more source

The Fate (Outcome) of Clinically Apparent Single Lesion and Oligofocal Nephroblastomatosis Treated According to SIOP/GPOH Protocols for Wilms Tumor

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The management of clinically apparent single lesions or oligofocal nephroblastomatosis, a facultative precursor of nephroblastoma, remains debated. Methods We retrospectively analyzed 37 patients with clinically apparent single or oligofocal nephroblastomatosis (two to three lesions per kidney) among 2347 patients registered between
Nils Welter   +17 more
wiley   +1 more source

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

Novel GRIA2 variant in a patient with atypical autism spectrum disorder and psychiatric symptoms: a case report

open access: yesBMC Pediatrics, 2022
Background As sequencing technology has advanced in recent years, a series of synapse-related gene variants have been reported to be associated with autism spectrum disorders (ASDs).
Qianyun Cai   +6 more
doaj   +1 more source

The New Block Cipher Design (Tigris Cipher) [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2015
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Omar A. Dawood   +2 more
openaire   +1 more source

Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles   +4 more
wiley   +1 more source

Implementing Knowledge Translation Strategies in Funded Research in Canada and Australia: A Case Study

open access: yesTechnology Innovation Management Review, 2016
There is an emerging literature describing the use of knowledge translation strategies to increase the relevance and usability of research, yet there are few real-world examples of how this works in practice. This case study reports on the steps taken to
Gabriel Moore   +5 more
doaj  

On construction of perfect ciphers

open access: yesVestnik Samarskogo Gosudarstvennogo Tehničeskogo Universiteta. Seriâ: Fiziko-Matematičeskie Nauki, 2014
K. Shannon in the 40s of the 20th century introduced the concept of a perfect cipher, which provides the best protection of plaintexts. Perfect secrecy means that cryptanalyst can obtain no information about the plaintext by observing the ciphertext.
Sergey M Ratseev
doaj   +1 more source

The Engima Cipher Machine [PDF]

open access: yes, 2012
There can be little doubt that the German “Enigma” was the best and safest mechanical cipher machine available in any country at the outbreak of the Second World War.
Wilson, Tony
core   +1 more source

Home - About - Disclaimer - Privacy