Results 31 to 40 of about 167,764 (227)
NetCDF model output of the entire state of the surface layer, including simulated dFe dyes, of the circum-Antarctic [PDF]
Dataset: Antarctic dFe model dyesFor a complete list of measurements, refer to the full dataset description in the supplemental file 'Dataset_description.pdf'.
Arrigo, Kevin R. +2 more
core +1 more source
Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core +1 more source
The present paper is a continuation of [13], [14] of the authors. Specifically, the paper considers the MD5-foliations associated to connected and simply connected MD5-groups such that their Lie algebras have 4-dimensional commutative derived ideal.
A. A. Kirillov +16 more
core +1 more source
Performance analysis of MD5 [PDF]
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be implemented in software and hardware, and discusses whether its use interferes with high bandwidth networking.
openaire +1 more source
Authentication method in SWIM based on improved Diameter/EAP-MD5
System wide information management (SWIM) provides the civil aviation information exchange and data sharing function by using service-oriented architecture (SOA).
Zhi-jun WU, Ting ZHAO, Jin LEI
doaj +2 more sources
Marek’s disease (MD) virus (MDV) has been evolving continuously, leading to increasing vaccination failure. Here, the MDV field strain BS/15 was isolated from a severely diseased Chinese chicken flock previously vaccinated with CVI988.
Guo-rong Sun +12 more
doaj +1 more source
ANALYSIS OF HASHING METHODS IN INFORMATION SYSTEMS
This article is devoted to the analysis of modern methods of hashing and collision search, as well as the scope and direction of their application in hashing procedures for data verification.
V. F. Antonov
doaj +1 more source
Partitioning the vertex set of $G$ to make $G\,\Box\, H$ an efficient open domination graph
A graph is an efficient open domination graph if there exists a subset of vertices whose open neighborhoods partition its vertex set. We characterize those graphs $G$ for which the Cartesian product $G \Box H$ is an efficient open domination graph when ...
Peterin, Iztok +3 more
core +1 more source
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano +3 more
doaj +1 more source
A Meaningful MD5 Hash Collision Attack [PDF]
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core +1 more source

