Results 11 to 20 of about 46,179 (288)

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]

open access: yesCommunications, 2015
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj   +2 more sources

Comparison of Anti-Viral Activity of Frog Skin Anti-Microbial Peptides Temporin-Sha and [K3]SHa to LL-37 and Temporin-Tb against Herpes Simplex Virus Type 1

open access: yesViruses, 2019
Temporins are anti-microbial peptides synthesized in the skin of frogs of the Ranidae family. The few studies to date that have examined their anti-viral properties have shown that they have potential as anti-viral therapies.
Maëva Roy   +8 more
doaj   +3 more sources

Evaluating the efficacy of eggshell-derived hydroxyapatite (EHA) and synthetic hydroxyapatite (SHA) in bone regeneration of maxillofacial defects-a randomized double-blind pilot comparative clinical-radiological study [PDF]

open access: yesJournal of Oral Biology and Craniofacial Research
Background: Defects of the maxillofacial skeleton lead to functional, aesthetic, social, and behavioral problems, that make the person isolate from the mainstream of society. So, bone regeneration is needed for the overall health. Since long time various
Khushboo Changani   +6 more
doaj   +2 more sources

Aplikasi Pengamanan Data dengan Teknik Algoritma Kriptografi AES dan Fungsi Hash SHA-1 Berbasis Desktop [PDF]

open access: yesJurnal Sisfokom, 2016
Dampak positif kemajuan teknologi informasi dapat membantu menyelesaikan pekerjan dan pertukaran data dan informasi dengan cepat, akurat, dan efisien.
Ratno Prasetyo, Asep Suryana
doaj   +4 more sources

Faster bowel recovery with superior haemorrhoidal artery preservation in patients undergoing sigmoidectomy for diverticular disease: A retrospective cohort study from the diverticular disease registry trial [PDF]

open access: yesJournal of Minimal Access Surgery
Introduction: The pathogenesis of diverticular disease varies significantly and so does its clinical presentation. The procedure for left-sided diverticular disease is standardised, but there is still no consensus on the level of arterial ligation.
Jacopo Crippa   +16 more
doaj   +2 more sources

A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map [PDF]

open access: yesEAI Endorsed Transactions on Energy Web, 2021
INTRODUCTION: In order to protect the owner’s visual multimedia data, various watermarking methods have introducedin the last few years. In image watermarking techniques, a secret watermark image inserted into another image.OBJECTIVES: The main aim of ...
Shahzad Alam, Tanvir Ahmad, M. Doja
doaj   +1 more source

Realization of low-loss tunable metasurfaces based on a shunting interdigitated capacitance structure

open access: yesResults in Physics, 2023
Based on interdigitated capacitance structure (ICS), a method for realizing low-loss tunable metasurfaces (TMS) is proposed in the paper. The variation in the metal patch structure and the PIN diode position indicates that introducing additional ...
Jianghao Tian   +5 more
doaj   +1 more source

Authenticated and Secure End-To-End Communication Channel Using SMS Messages [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
One of the key issues of modern cryptography is the problem of establishing a secure end-to-end communication over an insecure communication channel. Short Message Service (SMS) is a hugely popular and easily adopted communications technology for mobile ...
Abdullah Abdullah
doaj   +1 more source

Applying Grover's Algorithm to Hash Functions: A Software Perspective

open access: yesIEEE Transactions on Quantum Engineering, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource ...
Richard H. Preston
doaj   +1 more source

Fast Implementation of SHA-3 in GPU Environment

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

Home - About - Disclaimer - Privacy