Handbook of applied cryptography
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy a...
Explore 5,217 academic publications
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy a...
ABSTRACT The last decade has seen a sharp increase in the number of scientific publications describing physiological and pathological functions of extracellular vesicles (EVs), ...
Practical application of the generalized Bell's theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm's version...
Abstract The fifth edition of the WHO Classification of Tumors of the Central Nervous System (CNS), published in 2021, is the sixth version of the international standard for the...
Epoxy embedding methods of Glauert and Kushida have been modified so as to yield rapid, reproducible, and convenient embedding methods for electron microscopy. The sections are ...
An extended basis set of atomic functions expressed as fixed linear combinations of Gaussian functions is presented for hydrogen and the first-row atoms carbon to fluorine. In t...
TreeView is a simple, easy to use phylogenetic tree viewing utility that runs under both MacOS (on Apple Macintosh computers) and under Microsoft Windows on Intel based computer...
Saturation has attained widespread acceptance as a methodological principle in qualitative research. It is commonly taken to indicate that, on the basis of the data that have be...
The Task Force for the management of arterial hypertension of the European Society of Cardiology (ESC) and the European Society of Hypertension (ESH)