Results 81 to 90 of about 133,735 (361)

A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher)

open access: yesInternational Journal of Machine Learning and Computing, 2019
Fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission on public communication networks.
Tun Myat Aung, H. Naing, Ni Ni Hla
semanticscholar   +1 more source

A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]

open access: yes, 2012
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core   +1 more source

Alveolar Soft Part Sarcoma in Pediatric and Young Adult Patients: A Report From the Children's Oncology Group Study ARST0332

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Alveolar soft part sarcoma (ASPS) is a rare soft tissue sarcoma occurring most commonly in adolescence and young adulthood. Methods We present the clinical characteristics, treatments, and outcomes of patients with newly diagnosed ASPS enrolled on the Children's Oncology Group study ARST0332.
Jacquelyn N. Crane   +11 more
wiley   +1 more source

Implementing Knowledge Translation Strategies in Funded Research in Canada and Australia: A Case Study

open access: yesTechnology Innovation Management Review, 2016
There is an emerging literature describing the use of knowledge translation strategies to increase the relevance and usability of research, yet there are few real-world examples of how this works in practice. This case study reports on the steps taken to
Gabriel Moore   +5 more
doaj  

Data Security of Encrypted Data Using Hash-Based Message Authentication Code (HMAC) and T9-Based Data Conversion

open access: yesPUP Journal of Science and Technology, 2018
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj   +1 more source

The Engima Cipher Machine [PDF]

open access: yes, 2012
There can be little doubt that the German “Enigma” was the best and safest mechanical cipher machine available in any country at the outbreak of the Second World War.
Wilson, Tony
core   +1 more source

Quantum Noise Randomized Ciphers

open access: yes, 2006
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom   +13 more
core   +1 more source

Implementing Health‐Related Quality of Life Assessment in Pediatric Oncology: A Feasibility Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background There is growing interest in embedding health‐related quality of life (HRQoL) assessment and patient‐reported outcome measures (PROMs) within clinical cancer care. This study evaluated the feasibility, acceptability, and usability of implementing an electronic PROM (ePROM) platform to measure HRQoL in children with cancer ...
Mikaela Doig   +13 more
wiley   +1 more source

Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez   +14 more
wiley   +1 more source

Home - About - Disclaimer - Privacy