Results 71 to 80 of about 166,374 (227)

Performance analysis of a security architecture for active networks in Java [PDF]

open access: yes, 2003
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo   +3 more
core   +2 more sources

A Performant, Scalable Processing Pipeline for High‐Quality and FAIR Environmental Sensor Data

open access: yesJournal of Geophysical Research: Biogeosciences, Volume 130, Issue 11, November 2025.
Abstract High‐resolution environmental monitoring is necessary to record, understand, and predict biogeochemical and ecological changes particularly in coastal systems but brings significant challenges in processing and making rapidly available the resulting data.
Stephanie C. Pennington   +14 more
wiley   +1 more source

Generating unique IDs from patient identification data using security models

open access: yesJournal of Pathology Informatics, 2016
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed   +2 more
doaj   +1 more source

EFSA statement on the interpretation of FAIR principles for mechanistic effect models in the regulatory environmental risk assessment of pesticides

open access: yesEFSA Journal, Volume 23, Issue 11, November 2025.
Abstract Among its objectives, the European Food Safety Authority working group on effect models in environmental risk assessment has worked towards the development and maintenance of a framework to facilitate the assessment of effect models within the scope of the European Food Safety Authority's activities. To fulfil this objective, the working group
European Food Safety Authority (EFSA)   +8 more
wiley   +1 more source

ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT

open access: yesTechno.Com, 2016
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj  

Beneficial effects of sunitinib on tumor microenvironment and immunotherapy targeting death receptor5

open access: yesOncoImmunology, 2019
Tumor-associated blood vessels and lymphatics are abnormal and dysfunctional. These are hallmarks of the tumor microenvironment, which has an immunosuppressive nature, such as through hypoxia. Treatment with anti-death receptor5 (DR5) monoclonal antibody
Yoko Tsukita   +12 more
doaj   +1 more source

DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5

open access: yesSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2019
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko   +3 more
doaj   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Synthesis and Coordination of Isomeric Phosphinoferrocene Sulfonates

open access: yesEuropean Journal of Inorganic Chemistry, Volume 28, Issue 30, October 22, 2025.
Two isomeric phosphinoferrocene sulfonates are prepared as homologs of 1′‐(diphenylphosphino)ferrocene‐1‐sulfonic acid and are isolated as stable crystalline ammonium salts. The reactions of these proligands with Pd(II) precursors containing an auxiliary C,N‐chelate ligand indicate the hemilabile nature of the phosphinosulfonates and lead to P ...
Martin Zábranský, Petr Štěpnička
wiley   +1 more source

Криптоанализ MD5

open access: yesВестник Национального технического университета Харьковский политехнический институт. Серия: Информатика и моделирование, 2005
В статті розглядаються сучасні методи кріптоаналізу хеш-функції MD5 з метою розкриття паролю та підробки цифрового підпису документу. Зроблені висновки відповідно до перспектив кріптоаналізу на сучасному технічному рівні та наведені рекомендації до подальшого використання MD5 з урахуванням знайдених вразливостей.
openaire   +3 more sources

Home - About - Disclaimer - Privacy