Results 251 to 260 of about 4,922,883 (290)
Some of the next articles are maybe not open access.
2012
Abstract This chapter discusses cryptographic mechanisms supporting different strengths of data integrity. It first covers hash functions, whose three core security properties are motivated by means of different use cases. It shows how the implications of birthday attacks dictate the output length of a hash function.
openaire +1 more source
Abstract This chapter discusses cryptographic mechanisms supporting different strengths of data integrity. It first covers hash functions, whose three core security properties are motivated by means of different use cases. It shows how the implications of birthday attacks dictate the output length of a hash function.
openaire +1 more source
An overview of real‐world data sources for oncology and considerations for research
Ca-A Cancer Journal for Clinicians, 2022Lynne Penberthy +2 more
exaly
Innovations in research and clinical care using patient‐generated health data
Ca-A Cancer Journal for Clinicians, 2020H S L Jim +2 more
exaly

