Results 11 to 20 of about 12,815 (252)

Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study [PDF]

open access: yesSensors
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Ezequiel Rey   +4 more
doaj   +2 more sources

Key Change Strategies for TCP-MD5

open access: green, 2007
The TCP-MD5 option is most commonly used to secure BGP sessions between routers. However, changing the long-term key is difficult, since the change needs to be synchronized between different organizations. We describe single-ended strategies that will permit (mostly) unsynchronized key changes.
Steven M. Bellovin
openalex   +5 more sources

Dynamic Changes in Viral Loads during Co-Infection with a Recombinant Turkey Herpesvirus Vector Vaccine and Very Virulent Marek’s Disease Virus In Vivo [PDF]

open access: yesViruses
Marek’s disease (MD), caused by the Marek’s disease virus (MDV), is a common infectious tumor disease in chickens and was the first neoplastic disease preventable by vaccination.
Tian Ding   +9 more
doaj   +2 more sources

Security Analysis of MD5 algorithm in Password Storage [PDF]

open access: goldApplied Mechanics and Materials, 2013
Hashing algorithms are commonly used to convert passwords into hashes which theoretically cannot be deciphered. This paper analyses the security risks of the hashing algorithm MD5 in password storage and discusses different solutions, such as salts and iterative hashing.
Mary Cindy Ah Kioon   +2 more
openalex   +2 more sources

Security system design for cloud computing by using the combination of AES256 and MD5 algorithm

open access: goldIOP Conference Series: Materials Science and Engineering, 2020
Data is a collection of information that is combined into one and has a very important meaning. In the study, the object to be secured is the password data, the encryption method Advanced Encryption Standard (AES) with a key length of 256 bits, before ...
Lukmanul Khakim   +2 more
openalex   +2 more sources

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash [PDF]

open access: bronzeInternational Journal of Distributed and Parallel Systems (IJDPS) Vol.2, No.5, September 2011 p95-103, ISSN: 0976 - 9757 [Online]; 2229 - 3957 [Print], 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security.
Mohammed Erritali   +2 more
arxiv   +2 more sources

Collisions for the compression function of MD5 [PDF]

open access: hybrid, 1994
At Crypto '91 Ronald L. Rivest introduced the MD5 Message Digest Algorithm as a strengthened version of MD4, differing from it on six points. Four changes are due to the two existing attacks on the two round versions of MD4. The other two changes should additionally strengthen MD5. However both these changes cannot be described as well-considered.
Bert den Boer, Antoon Bosselaers
openalex   +4 more sources

Problems using MD5 with IPv6

open access: hybridPerformance Evaluation, 1996
Abstract The MD5 algorithm has been specified as part of the IPv6 protocol. However, some questions have been raised as to the ability of MD5 to provide the throughput needed for high-speed networks. This paper examines the performance of MD5 on the POWER2 architecture. The cause of poor performance for MD5 is identified, and three areas are examined
Larry D. Barchett   +3 more
openalex   +3 more sources

How to Break EAP-MD5 [PDF]

open access: bronze, 2012
We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which ...
Fanbao Liu, Tao Xie
openalex   +3 more sources

FPGA implementation of MD5 hash algorithm [PDF]

open access: greenCanadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555), 2002
In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC.
Janaka Deepakumara   +2 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy