Results 31 to 40 of about 166,374 (227)
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi +1 more
core +4 more sources
The present paper is a continuation of [13], [14] of the authors. Specifically, the paper considers the MD5-foliations associated to connected and simply connected MD5-groups such that their Lie algebras have 4-dimensional commutative derived ideal.
A. A. Kirillov +16 more
core +1 more source
Naturally Rehearsing Passwords [PDF]
We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords.
A. Acquisti +18 more
core +1 more source
Authentication method in SWIM based on improved Diameter/EAP-MD5
System wide information management (SWIM) provides the civil aviation information exchange and data sharing function by using service-oriented architecture (SOA).
Zhi-jun WU, Ting ZHAO, Jin LEI
doaj +2 more sources
Marek’s disease (MD) virus (MDV) has been evolving continuously, leading to increasing vaccination failure. Here, the MDV field strain BS/15 was isolated from a severely diseased Chinese chicken flock previously vaccinated with CVI988.
Guo-rong Sun +12 more
doaj +1 more source
ANALYSIS OF HASHING METHODS IN INFORMATION SYSTEMS
This article is devoted to the analysis of modern methods of hashing and collision search, as well as the scope and direction of their application in hashing procedures for data verification.
V. F. Antonov
doaj +1 more source
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano +3 more
doaj +1 more source
A Meaningful MD5 Hash Collision Attack [PDF]
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core +1 more source
Collisions for the compression function of MD5 [PDF]
At Crypto '91 Ronald L. Rivest introduced the MD5 Message Digest Algorithm as a strengthened version of MD4, differing from it on six points. Four changes are due to the two existing attacks on the two round versions of MD4. The other two changes should additionally strengthen MD5. However both these changes cannot be described as well-considered.
den Boer, Bert, Bosselaers, Antoon
openaire +2 more sources
Objective This study assessed sarilumab in treating patients with polyarticular‐course juvenile idiopathic arthritis (pcJIA). Methods This phase 2b, open‐label study (NCT02776735) consisted of three sequential parts (each with a core‐treatment and extension‐phase). During part 1, three doses were assessed in two weight groups (Group A/B: ≥30–60 kg/≥10–<
Fabrizio De Benedetti +19 more
wiley +1 more source

