Results 61 to 70 of about 46,179 (288)
For identification of any message it is not necessary to have available all message, but it is sufficient for its autentication its hashing. Hashing is used at safe put passwords, decode keys, autentication its hashing.
Ladislav Schwartz, Dusan Trstensky
doaj
Sensitive parameters of embankment deformation behavior for coarse-grained sulfate saline soil
In order to determine the sensitive parameters of embankment deformation behavior for coarse-grained sulfate saline soil, the quantitative analysis model for the correlation sensitive parameters is proposed, and the relevant influence factors and the ...
ZHANG Sha-sha 1, WANG Yong-wei 2, BAO Wei-xing 3, YANG Xiao-hua 1, WANG Long 1
doaj +1 more source
XML data integrity based on concatenated hash function [PDF]
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core
Computing on Masked Data to improve the Security of Big Data
Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users.
Gadepally, Vijay +6 more
core +1 more source
Metabolism‐Based Biomarkers for Rapid Phenotypic Antibiotic Susceptibility Testing
Metabolic differences emerging after antibiotic exposure provide rapid phenotypic signals of susceptibility and resistance. This review summarizes metabolic biomarkers for rapid phenotypic AST, associated with nutrient uptake, respiratory activity, metabolic reprogramming, and enzymatic function. ABSTRACT The accelerating global crisis of antimicrobial
Sha Yu +7 more
wiley +1 more source
Transposase‐Assisted Donor Tethering Boosts Large‐Fragment HDR in Plants
A transposase‐assisted donor tethering strategy is developed to enhance homology‐directed repair in plants. By recruiting donor DNA to double‐strand breaks and synergizing with repair pathway reprogramming and transcription‐coupled donor design, this system markedly improves large‐fragment targeted insertion efficiency, providing a robust platform for ...
Sha Wei +8 more
wiley +1 more source
A biomimetic, fiber‐reinforced hydrogel (FE‐PDA@Fib/Gel‐TG) that enables dual‐phase cranial defect repair. The system provides: instant hemostasis in the early stage, and sustained co‐delivery of pro‐angiogenic and osteogenic signals for synergistic vascularized bone regeneration.
Lingbin Che +9 more
wiley +1 more source
Background Though total shoulder arthroplasty (TSA) has been an acknowledged treatment option for glenohumeral osteoarthritis, resurfacing hemiarthroplasty (RHA) and stemmed hemiarthroplasty (SHA) may be preferred in some circumstances by surgeons ...
Baoliang Zhang +3 more
doaj +1 more source
Collisions of SHA-0 and Reduced SHA-1 [PDF]
In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and introduce the first results on SHA-1. The results include a generic multi-block technique that uses near-collisions in order to find collisions, and a four-block collision of SHA-0 found using this technique with complexity 251.
Eli Biham +5 more
openaire +1 more source
A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets.
Felten, Edward W. +2 more
core +1 more source

