Results 101 to 110 of about 154,141 (333)

Challenges and opportunities in mitigating sarcoptic mange in wild South American camelids

open access: yesThe Journal of Wildlife Management, EarlyView.
Wild South American camelids—vicuña and guanaco—face threats from sarcoptic mange, a contagious skin disease linked to severe population declines. Despite its impact, major gaps remain in understanding disease dynamics. This review summarizes current knowledge, identifies key data and management gaps, and outlines urgent actions for effective ...
Alynn M. Martin   +13 more
wiley   +1 more source

Verifiable Random Functions (VRFs) [PDF]

open access: yes, 2018
A Verifiable Random Function (VRF) is the public-key version of a keyed cryptographic hash. Only the holder of the private key can compute the hash, but anyone with public key can verify the correctness of the hash.
Goldberg, Sharon   +3 more
core  

On the Indifferentiability of the Grøstl Hash Function [PDF]

open access: yes, 2010
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the security of hash functions. Concretely, it ensures that a hash function has no structural design flaws and thus guarantees security against generic attacks up to the proven bounds. In this work we prove the indifferentiability of Grostl, a second round SHA-
Andreeva, Elena   +2 more
openaire   +3 more sources

Incongruent, but I Get It! How Narrative Transportation Drives Engagement in Virtual Reality Advertising

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT Virtual reality (VR) is a promising new technology that has gained attention from industry and academia, focusing on immersing consumers in simulated services and experiences and, more recently, on recognizing the emerging trend of video watching using VR headsets.
Meng‐Hua Hsieh   +2 more
wiley   +1 more source

Cryptanalysis of the GOST Hash Function [PDF]

open access: yes, 2008
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a 256-bit hash value. As opposed to most commonly used hash functions such as MD5 and SHA-1, the GOST hash function defines, in addition to the common iterative structure, a ...
Kontak, Marcin   +4 more
openaire   +3 more sources

Alternating‐contrast single‐shot spiral MR‐ARFI with model‐based displacement map reconstruction

open access: yesMagnetic Resonance in Medicine, EarlyView.
Abstract Purpose To improve single‐shot spiral MR‐Acoustic Radiation Force Imaging (MR‐ARFI)'s robustness to dynamic phase errors and evaluate it in non‐human primates (NHPs) with a low‐f‐number transducer. Methods A single‐shot spiral MR‐ARFI pulse sequence with 2 mm in‐plane resolution and alternating displacement phase contrast was implemented to ...
Saikat Sengupta   +4 more
wiley   +1 more source

Enhanced payload volume in the least significant bits image steganography using hash function. [PDF]

open access: yesPeerJ Comput Sci, 2023
Ghadi YY   +5 more
europepmc   +1 more source

Hash Embeddings for Efficient Word Representations

open access: yes, 2017
We present hash embeddings, an efficient method for representing words in a continuous vector form. A hash embedding may be seen as an interpolation between a standard word embedding and a word embedding created using a random hash function (the hashing ...
Hansen, Jonas Meinertz   +2 more
core  

A Digital Phantom for MR Spectroscopy Data Simulation

open access: yesMagnetic Resonance in Medicine, EarlyView.
ABSTRACT Purpose Simulated data is increasingly valued by researchers for validating MRS processing and analysis algorithms. However, there is no consensus on the optimal approaches for simulation models and parameters. This study introduces a novel MRS digital brain phantom framework, providing a comprehensive and modular foundation for MRS data ...
D. M. J. van de Sande   +11 more
wiley   +1 more source

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy