Results 61 to 70 of about 166,374 (227)

Selection of EAP-authentication methods in WLANs [PDF]

open access: yes, 2007
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks.
Ali, KM, Owens, TJ
core  

Problems using MD5 with IPv6

open access: yesPerformance Evaluation, 1996
Summary: The MD5 algorithm has been specified as part of the IPv6 protocol. However, some questions have been raised as to the ability of MD5 to provide the throughput needed for high-speed networks. This paper examines the performance of MD5 on the POWER2 architecture.
Barchett, Larry D.   +3 more
openaire   +2 more sources

Versatile High‐Sensitivity EPR Using Superconducting Spiral Microresonators

open access: yesSmall Methods, EarlyView.
A significant sensitivity enhancement in conventional X‐band pulsed EPR is achieved using planar spiral microresonators fabricated from high‐temperature superconducting YBCO. Fully compatible with standard instrumentation, the approach enables high‐fidelity spin control under typical sample conditions.
Gediminas Usevičius   +18 more
wiley   +1 more source

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

Forensic analysis and evaluation of file‐wiping applications in Android OS

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh   +6 more
wiley   +1 more source

Counting spots: Leopard density along a gradient of conservation rigor

open access: yesConservation Science and Practice, EarlyView.
We assess the density of leopard populations in and around Kruger National Park in South Africa and investigate the drivers behind differences in leopard densities across the landscape. In well protected areas leopard population density is influenced by biological, bottom‐up processes with NDVI serving as a proxy for prey catchability.
Lucy K. Smyth   +3 more
wiley   +1 more source

Wpływ zastosowania programowania równoległego na wydajność algorytmów kryptograficznych

open access: yesJournal of Computer Sciences Institute, 2016
W artykule zostały porównane możliwości zrównoleglenia dwóch algorytmów z dziedziny kryptografii: szyfrowania XOR oraz wyszukiwania kolizji funkcji skrótu MD5.
Mateusz Kraska, Piotr Kozieł
doaj   +1 more source

A comparison of forensic toolkits and mass market data recovery applications [PDF]

open access: yes, 2013
Digital forensic application suites are large, expensive, complex software products, offering a range of functions to assist in the investigation of digital artifacts.
Buchanan-Wollaston, J.   +2 more
core  

A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources

open access: yesSoftware: Practice and Experience, Volume 55, Issue 12, Page 1915-1930, December 2025.
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy