Keamanan RESTful Web Service Menggunakan JSON Web Token (JWT) HMAC SHA-512
Day to day information technology is constantly evolving, allowing a wide range of technologies, programming languages, and diverse architectures to keep popping up.
Alam Rahmatulloh+2 more
doaj +1 more source
Stressor- and Corticotropin releasing Factor-induced Reinstatement and Active Stress-related Behavioral Responses are Augmented Following Long-access Cocaine Self-administration by Rats [PDF]
Rationale Stressful events during periods of drug abstinence likely contribute to relapse in cocaine-dependent individuals. Excessive cocaine use may increase susceptibility to stressor-induced relapse through alterations in brain corticotropin-releasing
AM Basso+62 more
core +2 more sources
Backgroud While serum levels of hyarulonic acid (sHA) is known to be useful for a burden of disease biomarker in knee OA, it is far from practical. The reference intervals must be established for biomarkers to be useful for clinical interpretation.
Kaneko Haruka+14 more
doaj +1 more source
Protein Adsorbate Biohybrids and Sequential Hystallosteric Protein Adsorption
Protein adsorption on solid surfaces is characterized by multivalence, binding-unit overlap, sequential adsorption, surface allosterics, lateral interactions and pronounced adsorption-desorption hysteresis, giving rise to the sequential, hystallosteric ...
Jennissen Herbert P.
doaj +1 more source
Custom ASIC Design for SHA-256 Using Open-Source Tools
The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and ...
Lucas Daudt Franck+4 more
doaj +1 more source
Analysis of the new standard hash function [PDF]
On 2$^{nd}$ October 2012 the NIST (National Institute of Standards and Technology) in the United States of America announced the new hashing algorithm which will be adopted as standard from now on. Among a total of 73 candidates, the winner was Keccak, designed by a group of cryptographers from Belgium and Italy.
arxiv
An Investigation of Precise Orbit and Clock Products for BDS-3 from Different Analysis Centers
A quality evaluation of precise products for BDS-3 constellations is presented for the first time in this contribution. Then, the tropospheric delay retrieval and positioning performance of BDS-3 precise point positioning (PPP) solutions using the ...
Pengli Shen+4 more
doaj +1 more source
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing [PDF]
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role.
Akın, Abdulkadir+6 more
core +2 more sources
High Throughput Implementation of the Keccak Hash Function Using the Nios-II Processor
Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures.
Argyrios Sideris+2 more
doaj +1 more source
In this article, a water‐evaporation driven energy harvester is devised that works even in the absence of sunlight. This is achieved by combining PVA hydrogel with thermoelectrics (TEG) to directly capture energy from water evaporation. Under mild conditions (RH 40%, T of 26 °C, and 2.8 m s−1 wind), 1.71 mW (1.02 W m−2) power can be generated, >3 fold ...
Zichen Gong, Ady Suwardi, Jing Cao
wiley +1 more source