Results 91 to 100 of about 160,083 (235)

SWIM: Synthesizing What I Mean [PDF]

open access: yes, 2015
Modern programming frameworks come with large libraries, with diverse applications such as for matching regular expressions, parsing XML files and sending email. Programmers often use search engines such as Google and Bing to learn about existing APIs.
arxiv   +1 more source

A Symbolic Intruder Model for Hash-Collision Attacks [PDF]

open access: yes, 2006
In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol ...
Chevalier, Yannick, Kourjieh, Mounira
core   +2 more sources

Innovative Hardware Accelerator Architecture for FPGA‐Based General‐Purpose RISC Microprocessors

open access: yesJournal of Electrical and Computer Engineering, Volume 2025, Issue 1, 2025.
Reconfigurable computing (RC) theory aims to take advantage of the flexibility of general‐purpose processors (GPPs) alongside the performance of application specific integrated circuits (ASICs). Numerous RC architectures have been proposed since the 1960s, but all are struggling to become mainstream.
Ehsan Ali, Iouliia Skliarova
wiley   +1 more source

ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT

open access: yesTechno.Com, 2016
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj  

Generating unique IDs from patient identification data using security models

open access: yesJournal of Pathology Informatics, 2016
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed   +2 more
doaj   +1 more source

An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack [PDF]

open access: yesarXiv, 2018
IEEE 802.1X is an international standard for Port-based Network Access Control which provides authentication for devices applicant of either local network or wireless local network. This standard defines the packing of EAP protocol on IEEE 802. In this standard, authentication protocols become a complementary part of network security.
arxiv  

Automatically Mining Program Build Information via Signature Matching

open access: yes, 2013
Program build information, such as compilers and libraries used, is vitally important in an auditing and benchmarking framework for HPC systems. We have developed a tool to automatically extract this information using signature-based detection, a common ...
Lu, Charng-Da
core   +1 more source

Endogenous Cu(II) Labeling for Distance Measurements on Proteins by EPR

open access: yesChemistry – A European Journal, Volume 30, Issue 72, December 23, 2024.
Quick and easy endogenous spin labeling: This work shows that hypotonic swelling is a reproducible and facile method to endogenously label proteins with Cu(II) protein spin label in E. coli cells. The method enables the facile measurement of structural constraints in‐cells. The figure was made using BioRender.com.
Hannah R. Hunter   +3 more
wiley   +1 more source

Beneficial effects of sunitinib on tumor microenvironment and immunotherapy targeting death receptor5

open access: yesOncoImmunology, 2019
Tumor-associated blood vessels and lymphatics are abnormal and dysfunctional. These are hallmarks of the tumor microenvironment, which has an immunosuppressive nature, such as through hypoxia. Treatment with anti-death receptor5 (DR5) monoclonal antibody
Yoko Tsukita   +12 more
doaj   +1 more source

О модификации алгоритма MD5 [PDF]

open access: yes, 2016
Предлагается вариант модификации известной хэш-функции с целью повышения ее стойкости. Показано, что при сохранении требований по быстродействию вычисления дайджеста сообщения на основе модифицированного алгоритма, вероятность коллизии второго рода ...
Буханцов, А. Д.   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy