Results 71 to 80 of about 169,700 (231)
ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj
In the PRIME‐MR study, patients with higher N‐terminal pro‐B‐type natriuretic peptide (NT‐proBNP) tertiles more frequently reached death or heart failure hospitalization (HFH) within 3 years. Log‐transformed NT‐proBNP levels independently predicted the primary endpoint (adjusted hazard ratio 1.17, 95% confidence interval 1.07–1.28; p < 0.001).
Philipp von Stein +70 more
wiley +1 more source
Performance analysis of a security architecture for active networks in Java [PDF]
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo +3 more
core +2 more sources
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed +2 more
core +1 more source
Tumor-associated blood vessels and lymphatics are abnormal and dysfunctional. These are hallmarks of the tumor microenvironment, which has an immunosuppressive nature, such as through hypoxia. Treatment with anti-death receptor5 (DR5) monoclonal antibody
Yoko Tsukita +12 more
doaj +1 more source
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas +6 more
wiley +1 more source
Generating unique IDs from patient identification data using security models
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed +2 more
doaj +1 more source
Counting spots: Leopard density along a gradient of conservation rigor
We assess the density of leopard populations in and around Kruger National Park in South Africa and investigate the drivers behind differences in leopard densities across the landscape. In well protected areas leopard population density is influenced by biological, bottom‐up processes with NDVI serving as a proxy for prey catchability.
Lucy K. Smyth +3 more
wiley +1 more source
Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi +2 more
doaj +1 more source

