Results 81 to 90 of about 166,374 (227)

Fe(III)‐Mediated Formation of Cu Nanoinclusions and Local Heterojunctions in CuWO4 Photoanodes

open access: yesAdvanced Materials Interfaces, Volume 12, Issue 19, October 6, 2025.
Fe(III) mediates the self‐assembly of CuWO4 nanostructures into core–shell architectures with Cu inclusions and WO3‐rich shells, enabling local p–n junction formation. This nanostructural transformation enhances charge separation and enables dual activity: oxygen evolution under photoelectrochemical operation and reactive oxygen species (ROS ...
Pietro Ostellari   +20 more
wiley   +1 more source

Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5

open access: yesEngineering Science and Technology, an International Journal, 2017
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi   +2 more
doaj   +1 more source

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 [PDF]

open access: yes, 2014
This paper presents key recovery attacks on Sandwich-MAC instantiating MD5, where Sandwich-MAC is an improved variant of HMAC and achieves the same provable security level and better performance especially for short messages. The increased interest in lightweight cryptography motivates us to analyze such a MAC scheme. We first improve a distinguishing-
Yu Sasaki, Lei Wang
openaire   +1 more source

Distant metastases of melanoma exhibit varying extent of intrapatient proteogenomic heterogeneity

open access: yesClinical and Translational Medicine, Volume 15, Issue 10, October 2025.
Comprehensive proteogenomic profiling of post mortem melanoma metastases from patients with multiple lesions reveals the protein‐level mutation landscape and dominant phenotypes of distant metastases. The study uncovers varying levels of intrapatient heterogeneity, potentially associated with survival and therapeutic response.
Beata Szeitz   +34 more
wiley   +1 more source

iPhone forensics methodology and tools [PDF]

open access: yes, 2008
iPhone mobile devices are rapidly overtaking the new generation of mobile phones market, especially among the young generation. It is also gaining a lot of popularity among security specialists and fancy gadgets for collectors.
Al-Hajri, Haitham, Sansurooah, Krishnun
core   +1 more source

Flexible Session Management in a Distributed Environment

open access: yes, 2010
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers.
  +17 more
core   +2 more sources

Towards Multi‐Class Socio‐Technical Congruence: Assessing Coordination in Collaborative Software Development Settings

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 9, September 2025.
We introduce multi‐class socio‐technical congruence (MC‐STC), an extension of the widely studied socio‐technical congruence framework, to enable the assessment of coordination between contributors with different functional alignments or roles (e.g., development and security).
Roshan Namal Rajapakse, Claudia Szabo
wiley   +1 more source

Secure Directories [PDF]

open access: yes, 2000
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core  

A Formula That Generates Hash Collisions

open access: yes, 2018
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core  

RANCANG BANGUN APLIKASI PENGAMANAN AKTA NOTARIS MENGGUNAKAN MD5 PADA KANTOR NOTARIS TAUFIQURRACHMAN, S.H.

open access: diamond, 2022
Inayatullah Inayatullah   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy