Results 41 to 50 of about 160,083 (235)
Criptografía y seguridad en M-COMMERCE
El presente trabajo analiza los parámetros de seguridad más utilizados en el comercio electrónico realizado a través de dispositivos móviles (m-commerce), dentro de este se hace referencia a los tipos de cifrados que se usan con el fin de precautelar la ...
Cristhian Romero Romero+2 more
doaj +1 more source
FPGA Design and Implementation of Data Covering Based on MD5 Algorithm [PDF]
The protection of information leads to protection of individual privacy for everyone. This protection is performed using encryption. Many types of encryption may be utilized while the simplest one is the covering of information.
Thamir R. Saeed
doaj +1 more source
Open k-monopolies in graphs: complexity and related concepts [PDF]
Closed monopolies in graphs have a quite long range of applications in several problems related to overcoming failures, since they frequently have some common approaches around the notion of majorities, for instance to consensus problems, diagnosis ...
Kuziak, Dorota+2 more
core +3 more sources
SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten ...
Fahmi Basya+2 more
doaj +1 more source
Sodium butyrate impedes the lymphoma caused by Marek's disease virus via regulating the mitochondrial apoptosis pathway. [PDF]
Sodium butyrate (NaB) has garnered attention in recent years for its ability to impede the malignant progression of tumors. In order to explore the potential inhibitory effects of NaB on the replication of Marek’s disease virus (MDV) and subsequent ...
Lin Q+10 more
europepmc +2 more sources
Seeing Is Not Always Believing: Invisible Collision Attack and Defence on Pre-Trained Models [PDF]
Large-scale pre-trained models (PTMs) such as BERT and GPT have achieved great success in diverse fields. The typical paradigm is to pre-train a big deep learning model on large-scale data sets, and then fine-tune the model on small task-specific data sets for downstream tasks.
arxiv
Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core +1 more source
Marek’s disease (MD) virus (MDV) has been evolving continuously, leading to increasing vaccination failure. Here, the MDV field strain BS/15 was isolated from a severely diseased Chinese chicken flock previously vaccinated with CVI988.
Guo-rong Sun+12 more
doaj +1 more source
RIES: Internet voting in action [PDF]
RIES stands for Rijnland Internet Election System. It is an online voting system that was developed by one of the Dutch local authorities on water management.
Hubbers, E.M.G.M.+2 more
core +10 more sources
Authentication method in SWIM based on improved Diameter/EAP-MD5
System wide information management (SWIM) provides the civil aviation information exchange and data sharing function by using service-oriented architecture (SOA).
Zhi-jun WU, Ting ZHAO, Jin LEI
doaj +2 more sources