Results 71 to 80 of about 167,764 (227)

Wpływ zastosowania programowania równoległego na wydajność algorytmów kryptograficznych

open access: yesJournal of Computer Sciences Institute, 2016
W artykule zostały porównane możliwości zrównoleglenia dwóch algorytmów z dziedziny kryptografii: szyfrowania XOR oraz wyszukiwania kolizji funkcji skrótu MD5.
Mateusz Kraska, Piotr Kozieł
doaj   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Innervation Drives Postembryonic Expansion of the Zebrafish Anterior Lateral Line System

open access: yesJournal of Comparative Neurology, Volume 534, Issue 1, January 2026.
A dramatic expansion of the anterior lateral line system occurs during zebrafish ontogeny, largely driven by the addition of superficial neuromasts. Here, we describe a new hybrid‐origin mechanism of neuromast addition and uncover a larval‐stage developmental switch to an innervation‐dependent phase of expansion.
Theresa J. Christiansen   +2 more
wiley   +1 more source

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

Quantitative Assessment Model for Technology Transfer Risks in University‐Enterprise Collaborative Innovation: Based on Multi‐Objective Optimization Strategy of Deep Adversarial Reinforcement Learning

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This study develops a deep adversarial reinforcement learning framework for dynamic technology transfer risk assessment. The research outcome DAGAN‐MORL has a misjudgment rate 6.3%, a delay of 1.8 h, and a profit error of 7.9%, leading at the industrial level, providing intelligent support for university‐enterprise collaborative innovation. ABSTRACT As
Guojun Wang
wiley   +1 more source

Generating unique IDs from patient identification data using security models

open access: yesJournal of Pathology Informatics, 2016
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed   +2 more
doaj   +1 more source

Forensic analysis and evaluation of file‐wiping applications in Android OS

open access: yesJournal of Forensic Sciences, Volume 71, Issue 1, Page 338-352, January 2026.
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh   +6 more
wiley   +1 more source

ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT

open access: yesTechno.Com, 2016
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj  

Secure Directories [PDF]

open access: yes, 2000
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core  

Prognostic value of NT‐proBNP in patients with primary mitral regurgitation undergoing transcatheter edge‐to‐edge repair

open access: yesEuropean Journal of Heart Failure, Volume 27, Issue 12, Page 2921-2934, December 2025.
In the PRIME‐MR study, patients with higher N‐terminal pro‐B‐type natriuretic peptide (NT‐proBNP) tertiles more frequently reached death or heart failure hospitalization (HFH) within 3 years. Log‐transformed NT‐proBNP levels independently predicted the primary endpoint (adjusted hazard ratio 1.17, 95% confidence interval 1.07–1.28; p < 0.001).
Philipp von Stein   +70 more
wiley   +1 more source

Home - About - Disclaimer - Privacy