Results 51 to 60 of about 13,790 (198)
Abstract In an increasingly globalized world challenged by multiple social problems, global social identifications (GSIs, e.g., with all humanity) are concepts of growing interest. Although such identifications can be affected by the cultural contexts in which they are manifested, research on them remains largely confined to Western, Educated ...
Katarzyna Hamer +72 more
wiley +1 more source
Authentication protocols on restricted devices [PDF]
Tato práce se zabývá obecně autentizačními metodami, speciálně autentizací pomocí znalosti. Následně jsou stručně popsány MD hash funkce, SHA hash funkce, Keccak, Blake, Grostl, JH, Skein a uvedeno jejich srovnání na nízkovýkonových mikrokontrolérech. Do
Šebesta, David
core
Deep Volumetric Super‐Resolution Imaging in Thick Biological Specimens With Sparse Scanning SIM
Sparse scanning structured illumination microscopy (SS‐SIM) extends the axial depth in super‐resolution fluorescence imaging by combining rapid laser scanning, pixel‐addressed intensity modulation, and sCMOS camera detection. SS‐SIM yields 1.6× lateral and 1.7× axial resolution gains over wide‐field microscopy and enables imaging through 300–600 µm ...
Sha An +8 more
wiley +1 more source
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3 [PDF]
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions.
Amy, Matthew +5 more
core +1 more source
This study reveals a 24.74% prevalence of dementia among elderly Gelao people in China, with women's rates more than double those of men and substantially exceeding the national average. We identify distinct sociocultural protective factors—including community engagement and traditional diets—alongside risk factors.
Xiaoling Zhao +10 more
wiley +1 more source
Fast Implementation of SHA-3 in GPU Environment
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj +1 more source
Verified Correctness and Security of mbedTLS HMAC-DRBG
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof.
Almeida José Bacelar +8 more
core +1 more source
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
Kombinasi AES dan HMAC SHA-256 untuk Pengamanan Parameter URL dari Serangan SQL Injection
SQL Injection merupakan salah satu ancaman terbesar dalam keamanan aplikasi web, dimana penyerang dapat memanipulasi database melalui exploitasi celah keamanan pada parameter URL.
Gagan Akhmad Fauzi, Alam Rahmatulloh
doaj +1 more source
Abstract Background Transperineal ultrasound (TPUS) is a valuable imaging tool for evaluating patients with a variety of pelvic floor disorders, including pelvic organ prolapse (POP). Currently, calculating measurements of anatomical structures and relationships as well as extracting the mid‐sagittal (MS) plane of 2D and 3D ultrasound images are ...
Zachary Szentimrey +5 more
wiley +1 more source

