Results 171 to 180 of about 154,141 (333)
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
John Kelsey, Bruce Schneier
openalex +1 more source
Cryptanalysis of Hash Functions with Structures [PDF]
Dmitry Khovratovich
openalex +1 more source
Current application of blockchain technology in healthcare and its potential roles in Urology
Objective To assess the current uses of blockchain technology in surgery and explore potential applications in urology. Methods A systematic literature review and critical appraisal was performed. The PubMed database was searched for all relevant papers published in English, between 2003 and 2023, on blockchain and surgery, and urology.
Sulleyman Felemban +6 more
wiley +1 more source
Security enhanced multi-factor biometric authentication scheme using bio-hash function. [PDF]
Choi Y, Lee Y, Moon J, Won D.
europepmc +1 more source
Secure network coding with minimum overhead based on hash functions [PDF]
Majid Adeli, Huaping Liu
openalex +1 more source
Comparing reef structure and mobile species assemblages at remnant and restored mussel reefs
Mussel restoration aims to replicate natural processes of reef establishment. The similarities in mussel reef structure and large mobile species communities observed between remnant and restored mussel reefs in this study provide evidence that, in the absence of intact systems, remnant mussel reefs adjacent to temperate rocky reefs may be suitable as ...
Al Alder, Jenny Hillman
wiley +1 more source
With rates of biodiversity loss accelerating globally, debate exists regarding the most efficient ways of allocating resources to conserve species. Woodland caribou are the focus of many Canadian conservation strategies. Here, we examine the extent caribouāfocused conservation can benefit wolverine, a Species at Risk that overlaps with caribou in ...
Rosemary Hohnen +2 more
wiley +1 more source
Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure. [PDF]
Xing H, Min R, Li S, Yang Z, Yang Y.
europepmc +1 more source
One-way Hash function based on chaotic neural network
Guangjie Liu +4 more
openalex +1 more source

