Results 61 to 70 of about 160,083 (235)

TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication

open access: yes, 2016
The majority of electronic communication today happens either via email or chat. Thanks to the use of standardised protocols electronic mail (SMTP, IMAP, POP3) and instant chat (XMPP, IRC) servers can be deployed in a decentralised but interoperable ...
Amann, Johanna   +4 more
core   +1 more source

Soft Tissue Contours at Pontic Sites With or Without Soft Tissue Grafting—A 15‐Year Follow‐Up of a Controlled Clinical Study

open access: yesJournal of Esthetic and Restorative Dentistry, Volume 37, Issue 2, Page 352-360, February 2025.
ABSTRACT Objectives To report on soft tissue contour changes at pontic sites with or without soft tissue grafting over an observation period of 15 years. Methods Fourteen patients received a fixed dental prosthesis (FDP) in the posterior zone in a controlled clinical study and were available at the 15‐year follow‐up.
Stefan P. Bienz   +5 more
wiley   +1 more source

Kompresi Teks Menggunakan Algoritma Huffman dan Md5 pada Instant Messaging Smartphone Android

open access: yesJurnal EECCIS (Electrics, Electronics, Communications, Controls, Informatics, Systems), 2015
Instant messaging is one of Android social media application that make user possible to send short messages directly in the same time (real time) using text to another user that online in the some network, more ever a lot of user using this application ...
M. Taofik Chulkamdi   +2 more
doaj   +1 more source

Assessing Sports‐Related Concussion in Aboriginal and Torres Strait Islander Peoples: First Responder and Health‐Care Workers Feedback on the Sport Concussion Assessment Tool

open access: yesHealth Promotion Journal of Australia, Volume 36, Issue 3, July 2025.
ABSTRACT Sport‐related concussion is a rising public health concern with claims that there is a concussion crisis in sport. An estimated 36% of Aboriginal and Torres Strait Islander peoples participate in sport‐related activity at least once per week; yet, there is a paucity of information relating to concussion assessment in this population.
Kahlia McCausland   +5 more
wiley   +1 more source

IS COMMON CAROTID INTIMA MEDIA THICKNESS AN INDEPENDENT PREDICTOR FOR CORONARY ARTERY DISEASE

open access: yesARYA Atherosclerosis, 2010
Introduction: Non-invasive measurement of carotid intima media thickness (IMT) has been noted as a marker for atherosclerosis and can serve as a predictor of cardiovascular accidents.
Masoume Sadeghi   +4 more
doaj  

Kode Autentikasi Hash pada Pesan Teks Berbasis Android

open access: yesJurnal Eksplora Informatika, 2018
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi.
Yusfrizal Bin Pairin
doaj   +1 more source

RFC8573: Message authentication code for the network time protocol [PDF]

open access: yes, 2019
The Network Time Protocol (NTP), as described in RFC 5905, states that NTP packets should be authenticated by appending NTP data to a 128-bit key and hashing the result with MD5 to obtain a 128-bit tag.
Goldberg, Sharon, Malhotra, Aanchal
core  

Midwifery Students' Views on Care Plans Used in Clinical Training: A Qualitative Study

open access: yesScandinavian Journal of Caring Sciences, Volume 39, Issue 2, June 2025.
ABSTRACT Background The preparation of a care plan is one of the duties of the nurse or midwife caring for the patient. In clinical practice, patient care is planned and implemented using NANDA‐I diagnoses in the care plan. The ability to write a care plan is taught theoretically and practically during undergraduate education.
Nazli Unlu Bidik, Zekiye Turan
wiley   +1 more source

Partitioning the vertex set of $G$ to make $G\,\Box\, H$ an efficient open domination graph

open access: yes, 2016
A graph is an efficient open domination graph if there exists a subset of vertices whose open neighborhoods partition its vertex set. We characterize those graphs $G$ for which the Cartesian product $G \Box H$ is an efficient open domination graph when ...
Peterin, Iztok   +3 more
core   +1 more source

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 [PDF]

open access: yes, 2014
This paper presents key recovery attacks on Sandwich-MAC instantiating MD5, where Sandwich-MAC is an improved variant of HMAC and achieves the same provable security level and better performance especially for short messages. The increased interest in lightweight cryptography motivates us to analyze such a MAC scheme. We first improve a distinguishing-
Lei Wang, Yu Sasaki
openaire   +2 more sources

Home - About - Disclaimer - Privacy