Results 71 to 80 of about 167,764 (227)
Wpływ zastosowania programowania równoległego na wydajność algorytmów kryptograficznych
W artykule zostały porównane możliwości zrównoleglenia dwóch algorytmów z dziedziny kryptografii: szyfrowania XOR oraz wyszukiwania kolizji funkcji skrótu MD5.
Mateusz Kraska, Piotr Kozieł
doaj +1 more source
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana +2 more
core +1 more source
Innervation Drives Postembryonic Expansion of the Zebrafish Anterior Lateral Line System
A dramatic expansion of the anterior lateral line system occurs during zebrafish ontogeny, largely driven by the addition of superficial neuromasts. Here, we describe a new hybrid‐origin mechanism of neuromast addition and uncover a larval‐stage developmental switch to an innervation‐dependent phase of expansion.
Theresa J. Christiansen +2 more
wiley +1 more source
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed +2 more
core +1 more source
This study develops a deep adversarial reinforcement learning framework for dynamic technology transfer risk assessment. The research outcome DAGAN‐MORL has a misjudgment rate 6.3%, a delay of 1.8 h, and a profit error of 7.9%, leading at the industrial level, providing intelligent support for university‐enterprise collaborative innovation. ABSTRACT As
Guojun Wang
wiley +1 more source
Generating unique IDs from patient identification data using security models
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed +2 more
doaj +1 more source
Forensic analysis and evaluation of file‐wiping applications in Android OS
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh +6 more
wiley +1 more source
ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core
In the PRIME‐MR study, patients with higher N‐terminal pro‐B‐type natriuretic peptide (NT‐proBNP) tertiles more frequently reached death or heart failure hospitalization (HFH) within 3 years. Log‐transformed NT‐proBNP levels independently predicted the primary endpoint (adjusted hazard ratio 1.17, 95% confidence interval 1.07–1.28; p < 0.001).
Philipp von Stein +70 more
wiley +1 more source

