Results 81 to 90 of about 167,764 (227)

Beneficial effects of sunitinib on tumor microenvironment and immunotherapy targeting death receptor5

open access: yesOncoImmunology, 2019
Tumor-associated blood vessels and lymphatics are abnormal and dysfunctional. These are hallmarks of the tumor microenvironment, which has an immunosuppressive nature, such as through hypoxia. Treatment with anti-death receptor5 (DR5) monoclonal antibody
Yoko Tsukita   +12 more
doaj   +1 more source

An optimistic fair e-commerce protocol for large e-goods [PDF]

open access: yes, 2006
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert   +4 more
core  

A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources

open access: yesSoftware: Practice and Experience, Volume 55, Issue 12, Page 1915-1930, December 2025.
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas   +6 more
wiley   +1 more source

A Formula That Generates Hash Collisions

open access: yes, 2018
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core  

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 [PDF]

open access: yes, 2014
This paper presents key recovery attacks on Sandwich-MAC instantiating MD5, where Sandwich-MAC is an improved variant of HMAC and achieves the same provable security level and better performance especially for short messages. The increased interest in lightweight cryptography motivates us to analyze such a MAC scheme. We first improve a distinguishing-
Yu Sasaki, Lei Wang
openaire   +1 more source

Counting spots: Leopard density along a gradient of conservation rigor

open access: yesConservation Science and Practice, Volume 7, Issue 12, December 2025.
We assess the density of leopard populations in and around Kruger National Park in South Africa and investigate the drivers behind differences in leopard densities across the landscape. In well protected areas leopard population density is influenced by biological, bottom‐up processes with NDVI serving as a proxy for prey catchability.
Lucy K. Smyth   +3 more
wiley   +1 more source

A Performant, Scalable Processing Pipeline for High‐Quality and FAIR Environmental Sensor Data

open access: yesJournal of Geophysical Research: Biogeosciences, Volume 130, Issue 11, November 2025.
Abstract High‐resolution environmental monitoring is necessary to record, understand, and predict biogeochemical and ecological changes particularly in coastal systems but brings significant challenges in processing and making rapidly available the resulting data.
Stephanie C. Pennington   +14 more
wiley   +1 more source

Performance analysis of a security architecture for active networks in Java [PDF]

open access: yes, 2003
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo   +3 more
core   +2 more sources

Sodium butyrate impedes the lymphoma caused by Marek’s disease virus via regulating the mitochondrial apoptosis pathway

open access: yesFrontiers in Veterinary Science
Sodium butyrate (NaB) has garnered attention in recent years for its ability to impede the malignant progression of tumors. In order to explore the potential inhibitory effects of NaB on the replication of Marek’s disease virus (MDV) and subsequent ...
Qiaoer Lin   +14 more
doaj   +1 more source

Flexible Session Management in a Distributed Environment

open access: yes, 2010
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers.
  +17 more
core   +2 more sources

Home - About - Disclaimer - Privacy