Results 31 to 40 of about 32,391 (267)

Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2018
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh   +2 more
doaj   +1 more source

Stressor- and Corticotropin releasing Factor-induced Reinstatement and Active Stress-related Behavioral Responses are Augmented Following Long-access Cocaine Self-administration by Rats [PDF]

open access: yes, 2008
Rationale Stressful events during periods of drug abstinence likely contribute to relapse in cocaine-dependent individuals. Excessive cocaine use may increase susceptibility to stressor-induced relapse through alterations in brain corticotropin-releasing
AM Basso   +62 more
core   +2 more sources

Reference intervals of serum hyaluronic acid corresponding to the radiographic severity of knee osteoarthritis in women

open access: yesBMC Musculoskeletal Disorders, 2013
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka   +14 more
doaj   +1 more source

Protein Adsorbate Biohybrids and Sequential Hystallosteric Protein Adsorption

open access: yesCurrent Directions in Biomedical Engineering, 2021
Protein adsorption on solid surfaces is characterized by multivalence, binding-unit overlap, sequential adsorption, surface allosterics, lateral interactions and pronounced adsorption-desorption hysteresis, giving rise to the sequential, hystallosteric ...
Jennissen Herbert P.
doaj   +1 more source

Custom ASIC Design for SHA-256 Using Open-Source Tools

open access: yesComputers, 2023
The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and ...
Lucas Daudt Franck   +4 more
doaj   +1 more source

Analysis of the new standard hash function [PDF]

open access: yesInternational Conference on Computer Aided Systems Theory, 142-149, 2013, 2022
On 2$^{nd}$ October 2012 the NIST (National Institute of Standards and Technology) in the United States of America announced the new hashing algorithm which will be adopted as standard from now on. Among a total of 73 candidates, the winner was Keccak, designed by a group of cryptographers from Belgium and Italy.
arxiv  

An Investigation of Precise Orbit and Clock Products for BDS-3 from Different Analysis Centers

open access: yesSensors, 2021
A quality evaluation of precise products for BDS-3 constellations is presented for the first time in this contribution. Then, the tropospheric delay retrieval and positioning performance of BDS-3 precise point positioning (PPP) solutions using the ...
Pengli Shen   +4 more
doaj   +1 more source

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing [PDF]

open access: yes, 2010
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role.
Akın, Abdulkadir   +6 more
core   +2 more sources

High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor

open access: yesTechnologies, 2020
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris   +2 more
doaj   +1 more source

Electricity Generation From Ambient Water Evaporation in the Absence of Sunlight via PVA‐Based Porous Hydrogels

open access: yesAdvanced Functional Materials, EarlyView.
In this article, a water‐evaporation driven energy harvester is devised that works even in the absence of sunlight. This is achieved by combining PVA hydrogel with thermoelectrics (TEG) to directly capture energy from water evaporation. Under mild conditions (RH 40%, T of 26 °C, and 2.8 m s−1 wind), 1.71 mW (1.02 W m−2) power can be generated, >3 fold ...
Zichen Gong, Ady Suwardi, Jing Cao
wiley   +1 more source

Home - About - Disclaimer - Privacy