Results 51 to 60 of about 160,083 (235)

A Meaningful MD5 Hash Collision Attack [PDF]

open access: yes, 2006
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core   +1 more source

Aberrant glycosylation of IgG in children with active lupus nephritis alters podocyte metabolism and causes podocyte injury

open access: yesArthritis &Rheumatology, Accepted Article.
Background Podocytes are integral to the maintenance of the glomerular filtration barrier. Their injury results in proteinuria and disease progression in lupus nephritis (LN). Aberrant IgG glycosylation drives podocyte injury in LN and leads to cytoskeletal rearrangement, motility changes and decreased nephrin production.
Rhea Bhargava   +9 more
wiley   +1 more source

Криптоанализ MD5 [PDF]

open access: yes, 2005
В статті розглядаються сучасні методи кріптоаналізу хеш-функції MD5 з метою розкриття паролю та підробки цифрового підпису документу. Зроблені висновки відповідно до перспектив кріптоаналізу на сучасному технічному рівні та наведені рекомендації до ...
Гугнин, Владимир Николаевич   +1 more
core  

Changes in Pain Sensitization after DMARD therapy are Associated with Changes in Disease Activity in Established Rheumatoid Arthritis

open access: yesArthritis &Rheumatology, Accepted Article.
Objective Abnormalities in pain regulatory mechanisms are common in patients with rheumatoid arthritis (RA). We investigated whether pain sensitization changes after treatment with a disease modifying anti‐rheumatic drug (DMARD) and explored associations between changes in pain sensitization and disease activity.
Burcu Aydemir   +10 more
wiley   +1 more source

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification

open access: yesIEEE Access, 2023
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano   +3 more
doaj   +1 more source

A novel adaptive weight bi-directional long short-term memory (AWBi-LSTM) classifier model for heart stroke risk level prediction in IoT. [PDF]

open access: yesPeerJ Comput Sci
Stroke prediction has become one of the significant research areas due to the increasing fatality rate. Hence, this article proposes a novel Adaptive Weight Bi-Directional Long Short-Term Memory (AWBi-LSTM) classifier model for stroke risk level ...
Thumilvannan S, Balamanigandan R.
europepmc   +3 more sources

A quadruplex real-time PCR assay combined with a conventional PCR for the differential detection of Marek’s disease virus vaccines and field strains

open access: yesFrontiers in Veterinary Science, 2023
To evaluate the effect of the vaccine and differentiate vaccine from virulent MDV, a new quadruplex real-time PCR assay based on TaqMan probes was developed to differentiate and accurately quantify HVT, CVI988 and virulent MDV-1.
Shaopeng Wu   +17 more
doaj   +1 more source

Message authentication codes for the Network Time Protocol [PDF]

open access: yes, 2018
RFC 5905 [RFC5905] states that Network Time Protocol (NTP) packets should be authenticated by appending a 128-bit key to the NTP data, and hashing the result with MD5 to obtain a 128-bit tag. This document deprecates MD5-based authentication,
Goldberg, Sharon, Malhotra, Aanchal
core  

Linear free energy relationship between reduction potential and photoreduction rate: studies on Drosophila cryptochrome

open access: yesThe FEBS Journal, EarlyView.
A series of modified FAD cofactors have been used to modulate the photochemistry of FAD‐containing cryptochrome. When 7‐halogenated FADs were used, a significantly faster signaling‐state formation was observed, due to the more positive reduction potentials and higher triplet yields compared to the natural FAD cofactors; thus, this study shows that the ...
Moustafa Okasha   +8 more
wiley   +1 more source

Cryptography: Perancangan Middleware Web Service Encryptor menggunakan Triple Key MD5. Base64, dan AES

open access: yesJurnal Tekno Insentif, 2021
Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode
Maulyanda Az   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy