Results 11 to 20 of about 166,374 (227)

An Electro-optical Hybrid Encryption Method based on MD5 Verification

open access: yesGuangtongxin yanjiu, 2022
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper.
XUAN Ran   +5 more
doaj   +3 more sources

Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13

open access: yesBuana Information Technology and Computer Sciences, 2020
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj   +1 more source

Pathogenicity and Pathotype Analysis of Henan Isolates of Marek’s Disease Virus Reveal Long-Term Circulation of Highly Virulent MDV Variant in China

open access: yesViruses, 2022
In recent years, outbreaks of Marek’s disease (MD) have been frequently reported in vaccinated chicken flocks in China. Herein, we have demonstrated that four Marek’s disease virus (MDV) isolates, HN502, HN302, HN304, and HN101, are all pathogenic and ...
Man Teng   +9 more
doaj   +1 more source

PENERAPAN ALGORITMA MESSAGE DIGEST 5 PADA FILE VIDEO

open access: yesJurnal Saintekom, 2020
The use of video documents as one of the media to convey information is very widely used today. Where is evident in some social networking applications contain a lot of content about information in the form of videos.
Rivalri Kristianto Hondro
doaj   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +1 more source

archivist: An R Package for Managing, Recording and Restoring Data Analysis Results [PDF]

open access: yes, 2017
Everything that exists in R is an object [Chambers2016]. This article examines what would be possible if we kept copies of all R objects that have ever been created.
Biecek, Przemyslaw, Kosinski, Marcin
core   +3 more sources

Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC [PDF]

open access: yes, 2009
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes the HMAC/NMAC-MD5 from HMAC/NMAC with a random function. The attack needs 297 queries, with a success probability 0.87, while the previous distinguishing attack on HMAC-MD5 reduced to 33 rounds takes 2126.1 messages with a ...
Xiaoyun Wang   +4 more
openaire   +1 more source

Desain Aplikasi Algoritma MD5 (Message Digest 5) Pada Media SMS Berbasis Android Mobile

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2017
Abstrak- Tulisan ini membahas tentang disain Aplikasi Algoritma MD5. Dalam desain ini dibuat model kirim dan terima SMS aman. Dari model ini bisa dibuat desain aplikasi berbasis objek menggunakan Unified Modeling Language (UML), State Machine untuk ...
Zaiful Bahri   +2 more
doaj   +3 more sources

A High-Resolution Hubble Space Telescope Study of Apparent Lyman Continuum Leakers at $z\sim3$ [PDF]

open access: yes, 2015
We present $U_{336}V_{606}J_{125}H_{160}$ follow-up $HST$ observations of 16 $z\sim3$ candidate LyC emitters in the HS1549+1919 field. With these data, we obtain high spatial-resolution photometric redshifts of all sub-arcsecond components of the LyC ...
Mostardi, Robin E.   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy