نتایج جستجو برای: 9 weaknesses

تعداد نتایج: 503181  

Journal: :The International Journal of Information and Learning Technology 2015

Journal: :Ufahamu: A Journal of African Studies 1974

2015
Andrea Visconti Simone Bossi Hany Ragab Alexandro Calò

Password-based key derivation functions are of particular interest in cryptography because they (a) input a password/passphrase (which usually is short and lacks enough entropy) and derive a cryptographic key; (b) slow down brute force and dictionary attacks as much as possible. In PKCS#5 [19], RSA Laboratories described a password based key derivation function called PBKDF2 that has been widel...

Journal: :Transactions of the Royal Society of Tropical Medicine and Hygiene 2012
Gabriel Daniel Hailu Tegegnework Tsion Demissie Richard Reithinger

To obtain preliminary data on the drug supply management system in Ethiopia, selected facilities were assessed for the availability of essential drugs and commodities for malaria, TB and HIV. Of the 48 surveyed hospitals and health centers, 9 (19%), 9 (19%) and 10 (21%) did not have malaria, TB or HIV drugs, respectively. Similarly, of 27 health posts, 9 (33%) and 6 (22%) did not have rapid dia...

2018
Gabriel Daniel Hailu Tegegnework Tsion Demissie Richard Reithinger

To obtain preliminary data on the drug supply management system in Ethiopia, selected facilities were assessed for the availability of essential drugs and commodities for malaria, TB and HIV. Of the 48 surveyed hospitals and health centers, 9 (19%), 9 (19%), and 10 (21%) did not have malaria, TB, or HIV drugs, respectively. Similarly, of 27 health posts, 9 (33%) and 6 (22%) did not have rapid d...

Journal: :SIAM Journal on Computing 1997

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید