UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 41,896
1.
  • Incidence and US Costs of C... Incidence and US Costs of Corticosteroid-Associated Adverse Events: A Systematic Literature Review
    Sarnes, Evelyn, PharmD, MPH; Crofford, Leslie, MD; Watson, Maria, PhD ... Clinical therapeutics, 10/2011, Volume: 33, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    Abstract Objective The objective of this systematic literature review was to evaluate the incidences and risks for adverse events (AEs) associated with oral and parenteral corticosteroids. An ...
Full text

PDF
2.
  • DECODING OF THE NONLINEAR E... DECODING OF THE NONLINEAR ERROR CONTROL CODE ON THE BASIS OF CRYPTOGRAPHIC ALGORITHM OF RIJNDAEL
    D. M. Bildziuk; S. B. Salomatin Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, 06/2019 8
    Journal Article
    Peer reviewed
    Open access

    The nonlinear error control code on the basis of cryptographic transformation of data through Rijndael algorithm is considered. Correction properties and fast decoding algorithms of a Rijndael-code ...
Full text
3.
  • DISTANCE PROPERTIES OF THE ... DISTANCE PROPERTIES OF THE NONLINEAR ERROR CONTROL CODE ON THE BASIS OF CRYPTOGRAPHIC ALGORITHM OF RIJNDAEL
    D. M. Bildziuk; S. B. Salomatin Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, 06/2019 7
    Journal Article
    Peer reviewed
    Open access

    The nonlinear error control code on the basis of cryptographic transformation of data through Rijndael algorithm is considered. Hamming distance properties of a Rijndael-code in thread and block ...
Full text
4.
  • An Energy-Efficient Reconfi... An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications
    Banerjee, Utsav; Wright, Andrew; Juvekar, Chiraag ... IEEE journal of solid-state circuits, 2019-Aug., 2019-8-00, Volume: 54, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    This paper presents the first hardware implementation of the datagram transport layer security (DTLS) protocol to enable end-to-end security for the Internet of Things (IoT). A key component of this ...
Full text

PDF
5.
Full text

PDF
6.
  • An image encryption scheme ... An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System
    Toughi, Shahryar; Fathi, Mohammad H.; Sekhavat, Yoones A. Signal processing, December 2017, 2017-12-00, Volume: 141
    Journal Article
    Peer reviewed

    •Usage of EC operations as initial random generator and encrypting through AES to generate new pseudo random to mask whole image pixels.•Simulations and analysis results show that cooperation of AES ...
Full text
7.
  • Patterns of agri-environmen... Patterns of agri-environmental scheme participation in Europe: Indicative trends from selected case studies
    Pavlis, Evangelos S.; Terkenli, Theano S.; Kristensen, Søren B.P. ... Land use policy, 11/2016, Volume: 57
    Journal Article
    Peer reviewed

    •We examine farmers' motives to participate in agri-environmental schemes (AES), in five study areas in Europe.•Our principal findings show that AES tend to be used by larger scale and more ...
Full text
8.
Full text

PDF
9.
Full text
10.
  • Image Steganography using L... Image Steganography using LSB and encrypted message with AES, RSA, DES, 3DES, and Blowfish
    Damrudi, Masumeh; Aval, Kamal Jadidy International journal of engineering and advanced technology, 11/2019, Volume: 8, Issue: 6s3
    Journal Article
    Open access

    In today’s world, confidential information is growing due to various areas of works. Internet is the main area of transmission of digital data, so security must be more considered. Two common ways of ...
Full text

PDF
1 2 3 4 5
hits: 41,896

Load filters