Results 51 to 60 of about 600,761 (285)
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the ...
Ghada Salim Mohammed
doaj
EthVault: A Secure and Resource‐Conscious FPGA‐Based Ethereum Cold Wallet
Cryptocurrency blockchain networks safeguard digital assets using cryptographic keys, with wallets playing a critical role in generating, storing, and managing these keys.
Joel Poncha Lemayian +3 more
doaj +1 more source
Background Phlebotomine sand flies are small blood-feeding insects of great medical and veterinary significance. Their identification relies basically on the microscopic examination of key morphological characters.
Filipe Dantas-Torres +2 more
doaj +1 more source
Shake well before use: Authentication based on Accelerometer Data [PDF]
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not ...
Gellersen, Hans, Mayrhofer, Rene
core +1 more source
Key Management for Secure Network Coding-Enabled Mobile Small Cells [PDF]
The continuous growth in wireless devices connected to the Internet and the increasing demand for higher data rates put ever increasing pressure on the 4G cellular network. The EU funded H2020-MSCA project “SECRET” investigates a scenario architecture to cover the urban landscape for the upcoming 5G cellular network.
de Ree, Marcus +4 more
openaire +1 more source
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed +5 more
wiley +1 more source
SMEs and the Innovation Management Process: A multi-level process conceptual framework
The aim of this paper is to propose a conceptual framework to manage the innovation process in small businesses. It is based on research from 11 case studies in the Montreal software industry using contingency and resource dependency theories.
Angelo Dossou-Yovo, Christian Keen
doaj +1 more source
Bucket Hashing with a Small Key Size [PDF]
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently, authentication codes. We show how it is possible to modify some known families of hash functions into a form such that the evaluation is similar to "bucket hashing", a technique for very fast hashing introduced by Rogaway. Rogaway's bucket, hash family
openaire +1 more source
Parent‐to‐Child Information Disclosure in Pediatric Oncology
ABSTRACT Background Despite professional consensus regarding the importance of open communication with pediatric cancer patients about their disease, actual practice patterns of disclosure are understudied. Extant literature suggests a significant proportion of children are not told about their diagnosis/prognosis, which is purported to negatively ...
Rachel A. Kentor +12 more
wiley +1 more source
The fringe of a B-tree with parameter $m$ is considered as a particular P\'olya urn with $m$ colors. More precisely, the asymptotic behaviour of this fringe, when the number of stored keys tends to infinity, is studied through the composition vector of ...
Chauvin, Brigitte +3 more
core +2 more sources

