Results 81 to 90 of about 12,815 (252)
Digital Signature untuk Menjaga Keaslian Data dengan Algoritma MD5 dan Algoritma RSA
Penelitian ini bertujuan untuk menjaga keaslian data untuk memberikan jaminan kepada si penerima bahwa data tersebut bebas dari modifikasi yang dilakukan oleh pihak lain, dan jika terjadi suatu modifikasi terhadap data tersebut, maka si penerima akan ...
B. K. Hutasuhut+2 more
semanticscholar +1 more source
Classification of 5-Dimensional MD-Algebras Having Non-Commutative Derived Ideals [PDF]
The paper presents a subclass of the class of MD5-algebras and MD5-groups, i.e. five dimensional solvable Lie algebras and Lie groups such that their orbits in the co-adjoint representation (K-orbits) are orbits of zero or maximal dimension. The main result of the paper is the classification up to an isomorphism of all MD5-algebras with the non ...
arxiv
Reducing Hash Function Complexity: MD5 and SHA-1 as Examples
Hash functions algorithms also called message digest algorithms, compress a message input of an arbitrary length, and produce an output with a fixed length that is distributed randomly. Several hash algorithms exist such as Md5 and SHA1. These algorithms
Yousef Ali Al-Hammadi+1 more
semanticscholar +1 more source
A MYB transcription factor underlying plant height in sorghum qHT7.1 and maize Brachytic 1 loci
SUMMARY Manipulating plant height is an essential component of crop improvement. Plant height was generally reduced through breeding in wheat, rice, and sorghum to resist lodging and increase grain yield but kept high for bioenergy crops. Here, we positionally cloned a plant height quantitative trait locus (QTL) qHT7.1 as a MYB transcription factor ...
Qi Mu+10 more
wiley +1 more source
ALGORITMA KRIPTOGRAFI GOST DENGAN IMPLEMENTASI MD5 UNTUK MENINGKATKAN NILAI AVALANCHE EFFECT
Dalam penerapan algoritma kriptografi GOST selain menggunakan Fiestel Network dengan panjang kunci 256 bit, juga memerlukan perputaran sejumlah 32 kali dalam setiap prosesnya.
Aisyatul Karima, Mohammad Nur Diyatan
doaj
Generating unique IDs from patient identification data using security models
Background: The use of electronic health records (EHRs) has continued to increase within healthcare systems in the developed and developing nations. EHRs allow for increased patient safety, grant patients easier access to their medical records, and offer
Emad A Mohammed+2 more
doaj +1 more source
An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack [PDF]
IEEE 802.1X is an international standard for Port-based Network Access Control which provides authentication for devices applicant of either local network or wireless local network. This standard defines the packing of EAP protocol on IEEE 802. In this standard, authentication protocols become a complementary part of network security.
arxiv
Implementation of Nihilist Cipher Algorithm in Securing Text Data With Md5 Verification
The development of information technology that is increasingly racing today makes it easy for anyone to exchange data or information. On the other hand, there are problems with data security which can be disrupted by irresponsible parties such as ...
Edy Victor Haryannto+4 more
semanticscholar +1 more source
Abstract Pharmacogenomics (PGx) investigates the influence of genetics on drug responses, enabling tailored treatments for personalized healthcare. This study assessed the accuracy of genotyping six genes using whole genome sequencing with four different computational tools and various sequencing depths. The effects of using different reference genomes
Andreas Halman+4 more
wiley +1 more source
Tumor-associated blood vessels and lymphatics are abnormal and dysfunctional. These are hallmarks of the tumor microenvironment, which has an immunosuppressive nature, such as through hypoxia. Treatment with anti-death receptor5 (DR5) monoclonal antibody
Yoko Tsukita+12 more
doaj +1 more source