Results 51 to 60 of about 164,602 (198)
Kompresi Teks Menggunakan Algoritma Huffman dan Md5 pada Instant Messaging Smartphone Android
Instant messaging is one of Android social media application that make user possible to send short messages directly in the same time (real time) using text to another user that online in the some network, more ever a lot of user using this application ...
M. Taofik Chulkamdi+2 more
doaj +1 more source
Message authentication codes for the Network Time Protocol [PDF]
RFC 5905 [RFC5905] states that Network Time Protocol (NTP) packets should be authenticated by appending a 128-bit key to the NTP data, and hashing the result with MD5 to obtain a 128-bit tag. This document deprecates MD5-based authentication,
Goldberg, Sharon, Malhotra, Aanchal
core
A Novel String Distance Function based on Most Frequent K Characters [PDF]
This study aims to publish a novel similarity metric to increase the speed of comparison operations. Also the new metric is suitable for distance-based operations among strings.
Altun, Oguz+3 more
core +1 more source
IS COMMON CAROTID INTIMA MEDIA THICKNESS AN INDEPENDENT PREDICTOR FOR CORONARY ARTERY DISEASE
Introduction: Non-invasive measurement of carotid intima media thickness (IMT) has been noted as a marker for atherosclerosis and can serve as a predictor of cardiovascular accidents.
Masoume Sadeghi+4 more
doaj
Automatically Mining Program Build Information via Signature Matching
Program build information, such as compilers and libraries used, is vitally important in an auditing and benchmarking framework for HPC systems. We have developed a tool to automatically extract this information using signature-based detection, a common ...
Lu, Charng-Da
core +1 more source
With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a
Nithya Chidambaram+3 more
doaj +1 more source
Micro computed tomography based finite element models of calcium phosphate scaffolds for bone tissue engineering [PDF]
Bone is a living tissue that is able to regenerate by itself. However, when severe bone defects occur, the natural regeneration may be impaired. In these cases, bone graft substitutes can be used to induce the natural healing process.
Jung, Timo Karl
core
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 [PDF]
This paper presents key recovery attacks on Sandwich-MAC instantiating MD5, where Sandwich-MAC is an improved variant of HMAC and achieves the same provable security level and better performance especially for short messages. The increased interest in lightweight cryptography motivates us to analyze such a MAC scheme. We first improve a distinguishing-
Lei Wang, Yu Sasaki
openaire +2 more sources
Myeloid-derived suppressor cells (MDSCs) have been demonstrated to suppress antitumor immunity and induce resistance to PD-1/PD-L1 blockade immunotherapy in gastric and colon cancer patients.
Yao Tang+8 more
doaj +1 more source
Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode
Maulyanda Az+2 more
doaj +1 more source