Results 91 to 100 of about 13,015 (291)

Waxy‐ or Putty‐Like Materials as a Novel Drug Preparation for Synthetic Cannabinoid Receptor Agonists: Detection in Prisons and In Vitro Cannabinoid Receptor Activity

open access: yesDrug Testing and Analysis, EarlyView.
Waxy‐ or putty‐like materials has emerged as a novel drug preparation for synthetic cannabinoids and other drugs in UK prisons. An in vitro CB1 bioassay was used to evaluate the CB1 activating potential of MDMB‐INACA and extracts from eight seized samples. MDMB‐INACA had moderate efficacy but low potency at CB1.
Axelle Timmerman   +9 more
wiley   +1 more source

Semi‐Paired Semi‐Supervised Deep Hashing for cross‐view retrieval

open access: yesIET Computer Vision, EarlyView., 2022
In this study, a Semi‐Paired Semi‐Supervised Deep Hashing (SPSDH) is proposed. SPSDH is a novel end‐to‐end deep neural network model with high‐order affinity. A non‐local higher‐order affinity measure that better considers the multimodal neighbourhood structure. And a common representation to associate different modalities is introduced, which combined
Yi Wang   +3 more
wiley   +1 more source

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj  

Annual Banned‐Substance Review 17th Edition—Analytical Approaches in Human Sports Drug Testing 2023/2024

open access: yesDrug Testing and Analysis, EarlyView.
Scenarios of drug exposure and administration as well as detection assays for drugs and methods of sports doping published between 2023 and 2024 are critically reviewed and evaluated in context with the Prohibited List 2024 as established by the World Anti‐Doping Agency.
Mario  Thevis   +2 more
wiley   +1 more source

Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier

open access: yesJournal of Mathematical Cryptology, 2016
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions.
Moody Dustin   +2 more
doaj   +1 more source

Online Supervised Sketching Hashing for Large-Scale Image Retrieval

open access: yesIEEE Access, 2019
Online hashing methods have achieved a good tradeoff between the accuracy and the efficiency for learning the hash functions in the online settings. Compared to the stochastic gradient descent-based online hashing methods, the data sketching-based online
Zhenyu Weng, Yuesheng Zhu
doaj   +1 more source

Cryptanalysis of the GOST Hash Function [PDF]

open access: yes, 2008
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a 256-bit hash value. As opposed to most commonly used hash functions such as MD5 and SHA-1, the GOST hash function defines, in addition to the common iterative structure, a ...
Kontak, Marcin   +4 more
openaire   +3 more sources

A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase

open access: yesIET Information Security, Volume 17, Issue 1, Page 66-79, January 2023., 2023
Abstract In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms. In 2019, the full‐round (24 rounds) GIMLI permutation was used as an underlying primitive for building AEAD GIMLI‐CIPHER and hash function GIMLI ...
Yongseong Lee   +3 more
wiley   +1 more source

Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA

open access: yesApplied Sciences
Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications.
Abdullah Sevin   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy