Results 71 to 80 of about 169,700 (231)

ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT

open access: yesTechno.Com, 2016
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj  

Prognostic value of NT‐proBNP in patients with primary mitral regurgitation undergoing transcatheter edge‐to‐edge repair

open access: yesEuropean Journal of Heart Failure, Volume 27, Issue 12, Page 2921-2934, December 2025.
In the PRIME‐MR study, patients with higher N‐terminal pro‐B‐type natriuretic peptide (NT‐proBNP) tertiles more frequently reached death or heart failure hospitalization (HFH) within 3 years. Log‐transformed NT‐proBNP levels independently predicted the primary endpoint (adjusted hazard ratio 1.17, 95% confidence interval 1.07–1.28; p < 0.001).
Philipp von Stein   +70 more
wiley   +1 more source

Performance analysis of a security architecture for active networks in Java [PDF]

open access: yes, 2003
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo   +3 more
core   +2 more sources

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

Beneficial effects of sunitinib on tumor microenvironment and immunotherapy targeting death receptor5

open access: yesOncoImmunology, 2019
Tumor-associated blood vessels and lymphatics are abnormal and dysfunctional. These are hallmarks of the tumor microenvironment, which has an immunosuppressive nature, such as through hypoxia. Treatment with anti-death receptor5 (DR5) monoclonal antibody
Yoko Tsukita   +12 more
doaj   +1 more source

Secure Directories [PDF]

open access: yes, 2000
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core  

A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources

open access: yesSoftware: Practice and Experience, Volume 55, Issue 12, Page 1915-1930, December 2025.
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas   +6 more
wiley   +1 more source

Generating unique IDs from patient identification data using security models

open access: yesJournal of Pathology Informatics, 2016
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed   +2 more
doaj   +1 more source

Counting spots: Leopard density along a gradient of conservation rigor

open access: yesConservation Science and Practice, Volume 7, Issue 12, December 2025.
We assess the density of leopard populations in and around Kruger National Park in South Africa and investigate the drivers behind differences in leopard densities across the landscape. In well protected areas leopard population density is influenced by biological, bottom‐up processes with NDVI serving as a proxy for prey catchability.
Lucy K. Smyth   +3 more
wiley   +1 more source

Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5

open access: yesEngineering Science and Technology, an International Journal, 2017
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy