Results 81 to 90 of about 12,815 (252)

Digital Signature untuk Menjaga Keaslian Data dengan Algoritma MD5 dan Algoritma RSA

open access: yesInfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan), 2019
Penelitian ini bertujuan untuk menjaga keaslian data untuk memberikan jaminan kepada si penerima bahwa data tersebut bebas dari modifikasi yang dilakukan oleh pihak lain, dan jika terjadi suatu modifikasi terhadap data tersebut, maka si penerima akan ...
B. K. Hutasuhut   +2 more
semanticscholar   +1 more source

Classification of 5-Dimensional MD-Algebras Having Non-Commutative Derived Ideals [PDF]

open access: yesarXiv, 2011
The paper presents a subclass of the class of MD5-algebras and MD5-groups, i.e. five dimensional solvable Lie algebras and Lie groups such that their orbits in the co-adjoint representation (K-orbits) are orbits of zero or maximal dimension. The main result of the paper is the classification up to an isomorphism of all MD5-algebras with the non ...
arxiv  

Reducing Hash Function Complexity: MD5 and SHA-1 as Examples

open access: yesInternational Journal of Mathematical Sciences and Computing, 2019
Hash functions algorithms also called message digest algorithms, compress a message input of an arbitrary length, and produce an output with a fixed length that is distributed randomly. Several hash algorithms exist such as Md5 and SHA1. These algorithms
Yousef Ali Al-Hammadi   +1 more
semanticscholar   +1 more source

A MYB transcription factor underlying plant height in sorghum qHT7.1 and maize Brachytic 1 loci

open access: yesThe Plant Journal, Volume 120, Issue 5, Page 2172-2192, December 2024.
SUMMARY Manipulating plant height is an essential component of crop improvement. Plant height was generally reduced through breeding in wheat, rice, and sorghum to resist lodging and increase grain yield but kept high for bioenergy crops. Here, we positionally cloned a plant height quantitative trait locus (QTL) qHT7.1 as a MYB transcription factor ...
Qi Mu   +10 more
wiley   +1 more source

ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT

open access: yesTechno.Com, 2016
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj  

Generating unique IDs from patient identification data using security models

open access: yesJournal of Pathology Informatics, 2016
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed   +2 more
doaj   +1 more source

An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack [PDF]

open access: yesarXiv, 2018
IEEE 802.1X is an international standard for Port-based Network Access Control which provides authentication for devices applicant of either local network or wireless local network. This standard defines the packing of EAP protocol on IEEE 802. In this standard, authentication protocols become a complementary part of network security.
arxiv  

Implementation of Nihilist Cipher Algorithm in Securing Text Data With Md5 Verification

open access: yesJournal of Physics: Conference Series, 2019
The development of information technology that is increasingly racing today makes it easy for anyone to exchange data or information. On the other hand, there are problems with data security which can be disrupted by irresponsible parties such as ...
Edy Victor Haryannto   +4 more
semanticscholar   +1 more source

Benchmarking pharmacogenomics genotyping tools: Performance analysis on short‐read sequencing samples and depth‐dependent evaluation

open access: yesClinical and Translational Science, Volume 17, Issue 8, August 2024.
Abstract Pharmacogenomics (PGx) investigates the influence of genetics on drug responses, enabling tailored treatments for personalized healthcare. This study assessed the accuracy of genotyping six genes using whole genome sequencing with four different computational tools and various sequencing depths. The effects of using different reference genomes
Andreas Halman   +4 more
wiley   +1 more source

Beneficial effects of sunitinib on tumor microenvironment and immunotherapy targeting death receptor5

open access: yesOncoImmunology, 2019
Tumor-associated blood vessels and lymphatics are abnormal and dysfunctional. These are hallmarks of the tumor microenvironment, which has an immunosuppressive nature, such as through hypoxia. Treatment with anti-death receptor5 (DR5) monoclonal antibody
Yoko Tsukita   +12 more
doaj   +1 more source

Home - About - Disclaimer - Privacy