Results 131 to 140 of about 164,602 (198)

Application of lentinan in suppression of Marek's disease virus infection. [PDF]

open access: yesPoult Sci
Gao Q   +6 more
europepmc   +1 more source

MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners

open access: bronze, 2009
Florian Mendel   +2 more
openalex   +1 more source

Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC

open access: gold, 2010
Lei Wang   +4 more
openalex   +2 more sources

Reeling in Big Phish with a Deep MD5 Net

open access: hybrid, 2010
Brad Wardman   +4 more
openalex   +2 more sources

Performance Analysis Cryptography Using AES-128 and Key Encryption Based on MD5

open access: hybrid
Reza Arista Pratama   +5 more
openalex   +1 more source

Rational <i>In Silico</i> Design of Selective TMPRSS6 Peptidomimetic Inhibitors via Exploitation of the S2 Subpocket. [PDF]

open access: yesJ Med Chem
Desgagné M   +12 more
europepmc   +1 more source

Dynamic Mobile Token for Web Security using MD5 and One Time Password Method

open access: bronze, 2012
I GedeN.AgungJayarana   +2 more
openalex   +1 more source

An antibiotic that mediates immune destruction of senescent cancer cells. [PDF]

open access: yesProc Natl Acad Sci U S A
Casagrande Raffi G   +17 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy