Results 71 to 80 of about 166,374 (227)
Performance analysis of a security architecture for active networks in Java [PDF]
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo +3 more
core +2 more sources
A Performant, Scalable Processing Pipeline for High‐Quality and FAIR Environmental Sensor Data
Abstract High‐resolution environmental monitoring is necessary to record, understand, and predict biogeochemical and ecological changes particularly in coastal systems but brings significant challenges in processing and making rapidly available the resulting data.
Stephanie C. Pennington +14 more
wiley +1 more source
Generating unique IDs from patient identification data using security models
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed +2 more
doaj +1 more source
Abstract Among its objectives, the European Food Safety Authority working group on effect models in environmental risk assessment has worked towards the development and maintenance of a framework to facilitate the assessment of effect models within the scope of the European Food Safety Authority's activities. To fulfil this objective, the working group
European Food Safety Authority (EFSA) +8 more
wiley +1 more source
ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj
Tumor-associated blood vessels and lymphatics are abnormal and dysfunctional. These are hallmarks of the tumor microenvironment, which has an immunosuppressive nature, such as through hypoxia. Treatment with anti-death receptor5 (DR5) monoclonal antibody
Yoko Tsukita +12 more
doaj +1 more source
DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko +3 more
doaj +1 more source
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana +2 more
core +1 more source
Synthesis and Coordination of Isomeric Phosphinoferrocene Sulfonates
Two isomeric phosphinoferrocene sulfonates are prepared as homologs of 1′‐(diphenylphosphino)ferrocene‐1‐sulfonic acid and are isolated as stable crystalline ammonium salts. The reactions of these proligands with Pd(II) precursors containing an auxiliary C,N‐chelate ligand indicate the hemilabile nature of the phosphinosulfonates and lead to P ...
Martin Zábranský, Petr Štěpnička
wiley +1 more source
В статті розглядаються сучасні методи кріптоаналізу хеш-функції MD5 з метою розкриття паролю та підробки цифрового підпису документу. Зроблені висновки відповідно до перспектив кріптоаналізу на сучасному технічному рівні та наведені рекомендації до подальшого використання MD5 з урахуванням знайдених вразливостей.
openaire +3 more sources

