Results 51 to 60 of about 13,790 (198)

Beyond WEIRD societies: Global social identifications across 45 countries and their socio‐cultural and economic predictors

open access: yesPolitical Psychology, Volume 47, Issue 3, June 2026.
Abstract In an increasingly globalized world challenged by multiple social problems, global social identifications (GSIs, e.g., with all humanity) are concepts of growing interest. Although such identifications can be affected by the cultural contexts in which they are manifested, research on them remains largely confined to Western, Educated ...
Katarzyna Hamer   +72 more
wiley   +1 more source

Authentication protocols on restricted devices [PDF]

open access: yes, 2014
Tato práce se zabývá obecně autentizačními metodami, speciálně autentizací pomocí znalosti. Následně jsou stručně popsány MD hash funkce, SHA hash funkce, Keccak, Blake, Grostl, JH, Skein a uvedeno jejich srovnání na nízkovýkonových mikrokontrolérech. Do
Šebesta, David
core  

Deep Volumetric Super‐Resolution Imaging in Thick Biological Specimens With Sparse Scanning SIM

open access: yesAdvanced Science, Volume 13, Issue 25, 4 May 2026.
Sparse scanning structured illumination microscopy (SS‐SIM) extends the axial depth in super‐resolution fluorescence imaging by combining rapid laser scanning, pixel‐addressed intensity modulation, and sCMOS camera detection. SS‐SIM yields 1.6× lateral and 1.7× axial resolution gains over wide‐field microscopy and enables imaging through 300–600 µm ...
Sha An   +8 more
wiley   +1 more source

Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3 [PDF]

open access: yes, 2016
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions.
Amy, Matthew   +5 more
core   +1 more source

Prevalence and Risk Factors of Dementia Among Older People of Gelao Ethnicity in China: A National Cross‐Sectional Study

open access: yesCNS Neuroscience &Therapeutics, Volume 32, Issue 5, May 2026.
This study reveals a 24.74% prevalence of dementia among elderly Gelao people in China, with women's rates more than double those of men and substantially exceeding the national average. We identify distinct sociocultural protective factors—including community engagement and traditional diets—alongside risk factors.
Xiaoling Zhao   +10 more
wiley   +1 more source

Fast Implementation of SHA-3 in GPU Environment

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

Verified Correctness and Security of mbedTLS HMAC-DRBG

open access: yes, 2017
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof.
Almeida José Bacelar   +8 more
core   +1 more source

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

Kombinasi AES dan HMAC SHA-256 untuk Pengamanan Parameter URL dari Serangan SQL Injection

open access: yesJurnal Informatika dan Multimedia
SQL Injection merupakan salah satu ancaman terbesar dalam keamanan aplikasi web, dimana penyerang dapat memanipulasi database melalui exploitasi celah keamanan pada parameter URL.
Gagan Akhmad Fauzi, Alam Rahmatulloh
doaj   +1 more source

Automated extraction of the plane of minimal hiatal dimensions and mid‐sagittal plane from 3D transperineal ultrasound

open access: yesMedical Physics, Volume 53, Issue 5, May 2026.
Abstract Background Transperineal ultrasound (TPUS) is a valuable imaging tool for evaluating patients with a variety of pelvic floor disorders, including pelvic organ prolapse (POP). Currently, calculating measurements of anatomical structures and relationships as well as extracting the mid‐sagittal (MS) plane of 2D and 3D ultrasound images are ...
Zachary Szentimrey   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy