• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 908
  • 358
  • 260
  • 233
  • 128
  • 69
  • 64
  • 58
  • 46
  • 38
  • 34
  • 13
  • 12
  • 9
  • 8
  • Tagged with
  • 2681
  • 566
  • 393
  • 343
  • 286
  • 247
  • 240
  • 237
  • 236
  • 235
  • 234
  • 222
  • 221
  • 196
  • 192
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

A Study of Key Success Factors of International Hot-spring Resorts in Taiwan

Lin, Ching-te 19 June 2009 (has links)
This research attempts conclude from the Key Success factors of International Hot-spring resort Hotels, and select one representative resort hotel Hotel from northern, middle, southern and eastern-north (including eastern) Taiwan Respectively. The chosen Hot-spring resorts serve for the case study of the research, which analyzes the key success factors of their success. After the researcher interviews experts the research prioritizes the key success factors in the following order with the agreement of experts: (1) brand image, (2)operation philosophies, (3)good finance, (4)characteristic hardware, (5)special service, (6)environmental surroundings, (7)market segmentation, (8)marketing charnels, (9)education and training. ¡@¡@The result of the research indicates that international Hot-spring resort Hotel in Taiwan place great emphasis on brand images, operation philosophy, market segmentation, characteristic hardware, and environment surroundings, Hotel managers are suggested to shift the focus to education and training, marketing chancels and service quality. By during so, the Hot-spring resort Hotel is differented from other competitors will find its edges against other Hotel, and will achieve in sustainable management in the end.
22

A Review of and Digital Guide to Common Insect Pests of Ontario Nursery and Landscape Plants

Cheung, David 24 August 2011 (has links)
A digital guide to 173 common insect pests of Ontario nursery and landscape plants was developed and illustrated with 1357 images. All available information on these species was reviewed and supplemented with observations made from field surveys in Ontario nurseries and from rearing individuals to desired life stages. Dichotomous keys to these species were written to aid in their identification and will form the basis for interactive keys to be included in a future version of the digital guide. An online, SQL database was developed using Drupal to store and manage species reviews and image content. A custom theme was designed to create an easily updated, online digital guide with image-search functionality and a sample interactive digital key to the mature larvae of pest Lepidoptera. The interactive digital guide will serve as a dynamic resource for the landscape plant production industry and facilitates rapid identification of important insect pests.
23

Multilevel access control and key management in scalable live streaming

Li, Xingyu Unknown Date
No description available.
24

Security proof methods for quantum key distribution protocols

Ferenczi, Agnes January 2013 (has links)
In this thesis we develop practical tools for quantum key distribution (QKD) security proofs. We apply the tools to provide security proofs for several protocols, ranging from discrete variable protocols in high dimensions, protocols with realistic implementations, measurement device independent QKD and continuous-variable QKD. The security proofs are based on the Devetak-Winter security framework [I. Devetak and A. Winter, Proc. of the Roy. Soc. of London Series A, 461, 207 (2005); B. Kraus, N. Gisin, and R. Renner, Phys. Rev. Lett., 95 080501 (2005)]. In the key rate calculation, it is often convenient to assume that the optimal attack is symmetric. Under the assumption that the parameter estimation is based on coarse-grained observations, we show that the optimal attack is symmetric, if the protocol and the postselection have sufficient symmetries. As an example we calculate the key rates of protocols using 2, d and d+1 mutually unbiased bases in d-dimensional Hilbert spaces. We investigate the connection between the optimal collective eavesdropping attack and the optimal cloning attack, in which the eavesdropper employs an optimal cloner to attack the protocol. We find that, in general, it does not hold that the optimal attack is an optimal cloner. However, there are classes of protocols, for which we can identify the optimal attack by an optimal cloner. We analyze protocols with mutually unbiased bases in d dimensions, and show that for the protocols with 2 and d+1 mutually unbiased bases the optimal attack is an optimal cloner, but for the protocols with d mutually unbiased bases, it is not. In optical implementations of the phase-encoded BB84 protocol, the bit information is usually encoded in the phase of two consecutive photon pulses generated in a Mach-Zehnder interferometer. In the actual experimental realization, the loss in the arms of the Mach-Zehnder interferometer is not balanced, for example because only one arm contains a lossy phase modulator. Since the imbalance changes the structure of the signals states and measurements, the BB84 security analysis no longer applies in this scenario. We provide a security proof for the unbalanced phase-encoded BB84. The loss does lower the key rate compared to a protocol without loss. However, for a realistic parameter regime, the same key rate is found by applying the original BB84 security analysis. Recently, the security of a measurement device-independent QKD setup with BB84 signal states was proven in Refs. [H.-K. Lo, M. Curty, and B. Qi, Phys. Rev. Lett., 108 (2012); S. L. Braunstein and S. Pirandola, Phys. Rev. Lett., 108 (2012)]. In this setup Alice and Bob send quantum states to an intermediate node, which performs the measurement, and is assumed to be controlled by Eve. We analyze the security of a measurement device-independent QKD protocol with B92 signal states, and calculate the key rates numerically for a realistic implementation. Based on our security proof we were able to prove the security of the strong reference pulse B92 protocol. We analyze the security of continuous-variable protocols using the entropic uncertainty relations established in Ref. [M. Berta, M. Christandl, R. Colbeck, J. M. Renes, and R. Renner, Nature Physics 6, 659 (2010)] to provide an estimate of the key rate based on the observed first and second moments. We analyze a protocol with squeezed coherent states and the 2-state protocol with two coherent states with opposite phases.
25

Multilevel access control and key management in scalable live streaming

Li, Xingyu 06 1900 (has links)
To prevent unauthorized access of multimedia content, effective access control and efficient key management schemes are of crucial importance for multimedia live streaming applications. To address the network heterogeneity, this thesis investigates scalable and multilevel access control, where a single bit stream can offer access to different levels of service. It uses the POSET hash-based structure to explore the data dependency between different layers in scalable coding, and proposes a secure and efficient key management scheme that uses public information and hash functions to reduce the rekey overhead. For those applications that require strict forward/backward security, sequential rekey is used to update keys. This thesis also addresses frequent membership update in live streaming, and considers applications that can tolerate a small amount of content leak. Through exploring their unique characteristics in membership dynamics, the proposed schemes reduce the rekey cost significantly. / Digital Signals and Image Processing
26

Rigorously analyzed algorithms for the discrete logarithm problem in quadratic number fields

Vollmer, Ulrich. January 1900 (has links) (PDF)
Darmstadt, Techn. Univ., Diss., 2003. / Computerdatei im Fernzugriff.
27

Scalable symmetric block ciphers based on group bases

Čanda, Valér. January 2001 (has links) (PDF)
Essen, Univ., Diss., 2001. / Computerdatei im Fernzugriff.
28

Scalable symmetric block ciphers based on group bases

Čanda, Valér. January 2001 (has links) (PDF)
Essen, Univ., Diss., 2001. / Computerdatei im Fernzugriff.
29

Design und Analyse kryptografischer Bausteine auf nicht-abelschen Gruppen

Tobias, Christian. January 2004 (has links) (PDF)
Giessen, Universiẗat, Diss., 2004.
30

Pädagogische, psychologische und kulturanalytische Traditionen und Perspektiven im Werk Ellen Keys

Mann, Katja. January 2003 (has links) (PDF)
Berlin, Humboldt-Universiẗat, Diss., 2003.

Page generated in 0.0305 seconds