Showing 1 - 20 results of 6,821 for search '"MD5"', query time: 0.19s Refine Results
  1. 1

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Undergraduates Project Papers
  2. 2

    A VHDL Model for Implementation of MD5 Hash Algorithm by Mohammed A. Noaman

    Published 2013-06-01
    “…The implementation of MD5 algorithm by using Xilinx-spartan-3A XCS1400AFPGA, with 50 MHz internal clock is helping for satisfies the above requirements.…”
    Get full text
    Article
  3. 3
  4. 4

    FPGA Design and Implementation of Data Covering Based on MD5 Algorithm by Thamir R. Saeed

    Published 2016-12-01
    “…The degree of these security algorithms depends on three keys; MD5 core code, MD5 iteration, and mode of data hashing. …”
    Get full text
    Article
  5. 5

    Design and implementation of MD5 hash function algorithm using verilog HDL by Shamsiah, Suhaili, Niam, Cleopatra Chundang, Zainah, Md Zain, Norhuzaimin, Julai

    Published 2022
    “…The architecture includes MD5 padding block, data path, and a controller. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2 & OSPF by Mohd Tahir, Hatim, Abu Al-Saud, Khalid, Saleh, Moutaz, Saleh, Mohammed

    Published 2009
    “…In this paper, we conduct performance evaluation comparisons on MD5 authenticated routing traffic with respect to EIGRP, RIPv2 and OSPF protocols. …”
    Get full text
    Article
  8. 8

    Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain by Nehad Hameed Hussein

    Published 2015-04-01
    “…In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. …”
    Get full text
    Article
  9. 9

    Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain by Nehad Hameed Hussein, Ass. Lect.

    Published 2015-12-01
    Subjects: “…fragile watermark; image authentication; dwt; adaptive threshold; hvs; md-5; rsa.…”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
    Get full text
    Thesis
  18. 18

    Pathogenicity and Pathotype Analysis of Henan Isolates of Marek’s Disease Virus Reveal Long-Term Circulation of Highly Virulent MDV Variant in China by Man Teng, Lu-Ping Zheng, Hui-Zhen Li, Sheng-Ming Ma, Zhi-Jian Zhu, Shu-Jun Chai, Yongxiu Yao, Venugopal Nair, Gai-Ping Zhang, Jun Luo

    Published 2022-07-01
    “…Pathotyping of HN302 was performed in comparison to a standard very virulent (vv) MDV strain Md5. We found that both CVI988 and HVT vaccines significantly reduced morbidity and mortality induced by HN302 or Md5 strains, but the protection indices (PIs) provided by these two vaccines against HN302 were significantly lower (27.03%) or lower (33.33%) than that against Md5, which showed PIs of 59.89% and 54.29%, respectively. …”
    Get full text
    Article
  19. 19

    Evaluation of the proximate composition, functional, and pasting properties of ichipipi maize flour by Princess Mpili, Victor Vicent, Leonard Rweyemamu

    Published 2024-06-01
    “…Convesely, the amounts of carbohydrates and fat were considerably reduced (p < 0.05) by 2.93 % and 10.93 %, respectively, from the ichipipi flour MD1 to MD5. Regarding the functional properties, water absorption and swelling capacities decreased, while the least gelation concentration increased significantly (p < 0.05) in the composite flours MD1 to MD5. …”
    Get full text
    Article
  20. 20