Results 91 to 100 of about 12,815 (252)

An autonomous blockchain‐based computational broker for e‐science

open access: yesConcurrency and Computation: Practice and Experience, Volume 36, Issue 13, 10 June 2024.
Abstract Blockchain infrastructures have emerged as a disruptive technology and have led to the realization of cryptocurrencies (peer‐to‐peer payment systems) and smart contracts. They can have a wide range of application areas in e‐Science due to their open, public nature and global accessability in a trustless manner. We propose and implement a smart
Alper Alimoğlu, Can Özturan
wiley   +1 more source

Assessment of anxiety in children during the COVID‐19 pandemic

open access: yesAnnals of the Child Neurology Society, Volume 2, Issue 2, Page 153-161, June 2024.
Abstract Objective This study assessed anxiety levels in children during the COVID‐19 pandemic and explored how factors related to COVID‐19 may have affected the prevalence of anxiety disorders among the pediatric population. Methods Childhood anxiety symptoms were assessed at various pediatric practices in Central New Jersey between July 2021 and ...
Carlos Lastra   +7 more
wiley   +1 more source

General Graph Identification By Hashing [PDF]

open access: yesarXiv, 2015
A method for identifying graphs using MD5 hashing is presented. This allows fast graph equality comparisons and can also be used to facilitate graph isomorphism testing. The graphs can be labeled or unlabeled. The method identifies vertices by hashing the graph configuration in their neighborhoods.
arxiv  

The relationship between emotional intelligence and optimism: A meta‐analysis

open access: yesInternational Journal of Psychology, Volume 59, Issue 3, Page 353-367, June 2024.
Optimism involves the general expectation good things will occur and greater optimism is associated with a number of positive life outcomes related to better mental and physical health. These outcomes include reduced likelihood of depression, more effective immune functioning and lower mortality.
Sarah L. Glassie, Nicola S. Schutte
wiley   +1 more source

Quantum Gauge Transformations and Braided Structure on Quantum Principal Bundles [PDF]

open access: yesarXiv, 1996
It is shown that every quantum principal bundle is braided, in the sense that there exists an intrinsic braid operator twisting the functions on the bundle. A detailed algebraic analysis of this operator is performed. In particular, it turns out that the braiding admits a natural extension to the level of arbitrary differential forms on the bundle ...
arxiv  

Authentication via wireless networks [PDF]

open access: yesMIPRO, 2006, 2007
Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of
arxiv  

BLAKE2: Simpler, Smaller, Fast as MD5 [PDF]

open access: yes, 2013
We present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures.
Zooko Wilcox-O'Hearn   +3 more
openaire   +2 more sources

A Secure Hash Function MD-192 With Modified Message Expansion [PDF]

open access: yesarXiv, 2010
Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash ...
arxiv  

On the Security of Encryption Modes of MD4, MD5 and HAVAL [PDF]

open access: yes, 2005
In this paper, we cryptanalyze the compression functions of MD4, MD5 and 4-, 5-pass HAVAL in encryption mode. We exploit the recently proposed related-key rectangle and boomerang techniques to show non-randomness of MD4, MD5 and 4-, 5-pass HAVAL and to distinguish them from a randomly chosen cipher.
Kim, J.   +3 more
openaire   +3 more sources

A New Approach in Expanding the Hash Size of MD5

open access: yesInt. J. Commun. Networks Inf. Secur., 2018
The enhanced MD5 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 128 bit using XOR and AND operators. Findings revealed that the hash value of the modified algorithm was not cracked or hacked during the ...
E. V. Maliberan   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy