Results 91 to 100 of about 160,083 (235)
SWIM: Synthesizing What I Mean [PDF]
Modern programming frameworks come with large libraries, with diverse applications such as for matching regular expressions, parsing XML files and sending email. Programmers often use search engines such as Google and Bing to learn about existing APIs.
arxiv +1 more source
A Symbolic Intruder Model for Hash-Collision Attacks [PDF]
In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol ...
Chevalier, Yannick, Kourjieh, Mounira
core +2 more sources
Innovative Hardware Accelerator Architecture for FPGA‐Based General‐Purpose RISC Microprocessors
Reconfigurable computing (RC) theory aims to take advantage of the flexibility of general‐purpose processors (GPPs) alongside the performance of application specific integrated circuits (ASICs). Numerous RC architectures have been proposed since the 1960s, but all are struggling to become mainstream.
Ehsan Ali, Iouliia Skliarova
wiley +1 more source
ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj
Generating unique IDs from patient identification data using security models
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed+2 more
doaj +1 more source
An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack [PDF]
IEEE 802.1X is an international standard for Port-based Network Access Control which provides authentication for devices applicant of either local network or wireless local network. This standard defines the packing of EAP protocol on IEEE 802. In this standard, authentication protocols become a complementary part of network security.
arxiv
Automatically Mining Program Build Information via Signature Matching
Program build information, such as compilers and libraries used, is vitally important in an auditing and benchmarking framework for HPC systems. We have developed a tool to automatically extract this information using signature-based detection, a common ...
Lu, Charng-Da
core +1 more source
Endogenous Cu(II) Labeling for Distance Measurements on Proteins by EPR
Quick and easy endogenous spin labeling: This work shows that hypotonic swelling is a reproducible and facile method to endogenously label proteins with Cu(II) protein spin label in E. coli cells. The method enables the facile measurement of structural constraints in‐cells. The figure was made using BioRender.com.
Hannah R. Hunter+3 more
wiley +1 more source
Tumor-associated blood vessels and lymphatics are abnormal and dysfunctional. These are hallmarks of the tumor microenvironment, which has an immunosuppressive nature, such as through hypoxia. Treatment with anti-death receptor5 (DR5) monoclonal antibody
Yoko Tsukita+12 more
doaj +1 more source
О модификации алгоритма MD5 [PDF]
Предлагается вариант модификации известной хэш-функции с целью повышения ее стойкости. Показано, что при сохранении требований по быстродействию вычисления дайджеста сообщения на основе модифицированного алгоритма, вероятность коллизии второго рода ...
Буханцов, А. Д.+1 more
core +1 more source