Results 41 to 50 of about 164,602 (198)

Chosen-prefix collisions for MD5 and applications [PDF]

open access: yesInternational Journal of Applied Cryptography, 2012
We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of chosen-prefix collisions. We have shown how, at an approximate expected cost of 239 calls to the MD5 compression function, for any two chosen message prefixes P and P', suffixes S and S' can be constructed such that the concatenated ...
Benne de Weger   +2 more
openaire   +1 more source

Authentication method in SWIM based on improved Diameter/EAP-MD5

open access: yesTongxin xuebao, 2014
System wide information management (SWIM) provides the civil aviation information exchange and data sharing function by using service-oriented architecture (SOA).
Zhi-jun WU, Ting ZHAO, Jin LEI
doaj   +2 more sources

A Chinese Variant Marek’s Disease Virus Strain with Divergence between Virulence and Vaccine Resistance

open access: yesViruses, 2017
Marek’s disease (MD) virus (MDV) has been evolving continuously, leading to increasing vaccination failure. Here, the MDV field strain BS/15 was isolated from a severely diseased Chinese chicken flock previously vaccinated with CVI988.
Guo-rong Sun   +12 more
doaj   +1 more source

ANALYSIS OF HASHING METHODS IN INFORMATION SYSTEMS

open access: yesСовременная наука и инновации, 2022
This article is devoted to the analysis of modern methods of hashing and collision search, as well as the scope and direction of their application in hashing procedures for data verification.
V. F. Antonov
doaj   +1 more source

Naturally Rehearsing Passwords [PDF]

open access: yes, 2013
We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords.
A. Acquisti   +18 more
core   +1 more source

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification

open access: yesIEEE Access, 2023
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano   +3 more
doaj   +1 more source

A Meaningful MD5 Hash Collision Attack [PDF]

open access: yes, 2006
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core   +1 more source

Kode Autentikasi Hash pada Pesan Teks Berbasis Android

open access: yesJurnal Eksplora Informatika, 2018
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi.
Yusfrizal Bin Pairin
doaj   +1 more source

A quadruplex real-time PCR assay combined with a conventional PCR for the differential detection of Marek’s disease virus vaccines and field strains

open access: yesFrontiers in Veterinary Science, 2023
To evaluate the effect of the vaccine and differentiate vaccine from virulent MDV, a new quadruplex real-time PCR assay based on TaqMan probes was developed to differentiate and accurately quantify HVT, CVI988 and virulent MDV-1.
Shaopeng Wu   +17 more
doaj   +1 more source

Partitioning the vertex set of $G$ to make $G\,\Box\, H$ an efficient open domination graph

open access: yes, 2016
A graph is an efficient open domination graph if there exists a subset of vertices whose open neighborhoods partition its vertex set. We characterize those graphs $G$ for which the Cartesian product $G \Box H$ is an efficient open domination graph when ...
Peterin, Iztok   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy