Results 191 to 200 of about 32,597 (206)
Some of the next articles are maybe not open access.
Ongoing Care of Patients After Primary Treatment for Their Cancer
Ca-A Cancer Journal for Clinicians, 2003exaly
Cryptographic hash functions: recent design trends and security notions
Saif Al‐Kuwari +2 more
openalex
Cryptography & Network Security Hash Function Applications, Attacks and Advances: A Review
Arvind K. Sharma, S. K. Mittal
openalex +1 more source
Biofabrication strategies for 3D in vitro models and regenerative medicine
Nature Reviews Materials, 2018Lorenzo Moroni +2 more
exaly
Evolutionary classification of CRISPR–Cas systems: a burst of class 2 and derived variants
Nature Reviews Microbiology, 2019Kira S Makarova +2 more
exaly
Adhesion, invasion and evasion: the many functions of the surface proteins of Staphylococcus aureus
Nature Reviews Microbiology, 2013Timothy J Foster, Joan A Geoghegan
exaly
Towards Secure and Fast Hash Functions (Special Section on Cryptography and Information Security)
Takashi Satoh, Mio Haga, Kaoru Kurosawa
openalex

