Results 61 to 70 of about 46,179 (288)

Hashing of Message

open access: yesAdvances in Electrical and Electronic Engineering, 2003
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj  

Sensitive parameters of embankment deformation behavior for coarse-grained sulfate saline soil

open access: yesYantu gongcheng xuebao, 2017
In order to determine the sensitive parameters of embankment deformation behavior for coarse-grained sulfate saline soil, the quantitative analysis model for the correlation sensitive parameters is proposed, and the relevant influence factors and the ...
ZHANG Sha-sha 1, WANG Yong-wei 2, BAO Wei-xing 3, YANG Xiao-hua 1, WANG Long 1
doaj   +1 more source

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

Computing on Masked Data to improve the Security of Big Data

open access: yes, 2015
Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users.
Gadepally, Vijay   +6 more
core   +1 more source

Metabolism‐Based Biomarkers for Rapid Phenotypic Antibiotic Susceptibility Testing

open access: yesAdvanced Science, EarlyView.
Metabolic differences emerging after antibiotic exposure provide rapid phenotypic signals of susceptibility and resistance. This review summarizes metabolic biomarkers for rapid phenotypic AST, associated with nutrient uptake, respiratory activity, metabolic reprogramming, and enzymatic function. ABSTRACT The accelerating global crisis of antimicrobial
Sha Yu   +7 more
wiley   +1 more source

Transposase‐Assisted Donor Tethering Boosts Large‐Fragment HDR in Plants

open access: yesAdvanced Science, EarlyView.
A transposase‐assisted donor tethering strategy is developed to enhance homology‐directed repair in plants. By recruiting donor DNA to double‐strand breaks and synergizing with repair pathway reprogramming and transcription‐coupled donor design, this system markedly improves large‐fragment targeted insertion efficiency, providing a robust platform for ...
Sha Wei   +8 more
wiley   +1 more source

A Bone Marrow–Mimetic Hydrogel Enables Dual‐Phase Hemostasis and Vascularized Osteogenesis for Cranial Defects

open access: yesAdvanced Science, EarlyView.
A biomimetic, fiber‐reinforced hydrogel (FE‐PDA@Fib/Gel‐TG) that enables dual‐phase cranial defect repair. The system provides: instant hemostasis in the early stage, and sustained co‐delivery of pro‐angiogenic and osteogenic signals for synergistic vascularized bone regeneration.
Lingbin Che   +9 more
wiley   +1 more source

Resurfacing hemiarthroplasty versus stemmed hemiarthroplasty for glenohumeral osteoarthritis: a meta-analysis

open access: yesArthroplasty, 2020
Background Though total shoulder arthroplasty (TSA) has been an acknowledged treatment option for glenohumeral osteoarthritis, resurfacing hemiarthroplasty (RHA) and stemmed hemiarthroplasty (SHA) may be preferred in some circumstances by surgeons ...
Baoliang Zhang   +3 more
doaj   +1 more source

Collisions of SHA-0 and Reduced SHA-1 [PDF]

open access: yes, 2005
In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and introduce the first results on SHA-1. The results include a generic multi-block technique that uses near-collisions in order to find collisions, and a four-block collision of SHA-0 found using this technique with complexity 251.
Eli Biham   +5 more
openaire   +1 more source

A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification

open access: yes, 2018
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets.
Felten, Edward W.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy