• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 28
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 48
  • 15
  • 11
  • 10
  • 10
  • 9
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Privacy-preserving cryptography from pairings and lattices / Cryptographie protégeant la vie privée à base de couplages et de réseaux

Mouhartem, Fabrice 18 October 2018 (has links)
Dans cette thèse, nous étudions les constructions cryptographiques prouvées pour la protection de la vie privée. Pour cela nous nous sommes intéressés aux preuves et arguments à divulgation nulles de connaissance et leurs applications. Un exemple de ces constructions est la signature de groupe. Ce protocole a pour but de permettre à un utilisateur de s'authentifier comme appartenant à un groupe, sans révéler son identité. Afin que les utilisateurs restent responsable de leurs agissements, une autorité indépendante est capable de lever l'anonymat d'un utilisateur en cas de litige. Une telle construction peut ainsi être utilisée, par exemple, dans les systèmes de transport en commun. Un utilisateur qui rentre dans un bus prouve ainsi son appartenance aux utilisateurs possédant un abonnement valide, sans révéler qui il est, et évitant ainsi que la société de transport ne le trace. En revanche, en cas d'incident sur le réseau, la société peut faire appel à la police pour lever l'anonymat des usagers présents au moment de l'incident. Nous avons proposé deux constructions de ces signatures de groupe, prouvées sûres sous des hypothèses simples dans le monde des couplages et des réseaux euclidiens. Dans la continuité de ces travaux, nous avons aussi proposé la première construction de chiffrement de groupe (l'équivalent de la signature de groupe pour le chiffrement) à base de réseaux euclidiens. Finalement, ces travaux nous ont amené à la construction d'un schéma de transfert inconscient adaptatif avec contrôle d'accès à base de réseaux euclidiens. Ces constructions à base de réseaux ont été rendues possibles par des améliorations successives de l'expressivité du protocole de Stern, qui reposait initialement sur la difficulté du problème du décodage de syndrome. / In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on zero-knowledge proofs and their applications.Group signatures are an example of such constructions.This primitive allows users to sign messages on behalf of a group (which they formerly joined), while remaining anonymous inside this group.Additionally, users remain accountable for their actions as another independent authority, a judge, is empowered with a secret information to lift the anonymity of any given signature.This construction has applications in anonymous access control, such as public transportations.Whenever someone enters a public transportation, he signs a timestamp. Doing this proves that he belongs to the group of people with a valid subscription.In case of problem, the transportation company hands the record of suspicious signatures to the police, which is able to un-anonymize them.We propose two constructions of group signatures for dynamically growing groups. The first is based on pairing-related assumptions and is fairly practical. The second construction is proven secure under lattice assumptions for the sake of not putting all eggs in the same basket.Following the same spirit, we also propose two constructions for privacy-preserving cryptography.The first one is a group encryption scheme, which is the encryption analogue of group signatures. Here, the goal is to hide the recipient of a ciphertext who belongs to a group, while proving some properties on the message, like the absence of malwares. The second is an adaptive oblivious transfer protocol, which allows a user to anonymously query an encrypted database, while keeping the unrequested messages hidden.These constructions were made possible through a series of work improving the expressiveness of Stern's protocol, which was originally based on the syndrome decoding problem.
32

Shakespeare eller Schiefauer? : Mekanismer bakom kanonbildandet i svenskämnet för årskurs 7–9 samt gymnasieskolan. / Shakespeare or Schiefauer? : Mechanisms behind canon creation in Swedish subject for grades 7–9 and upper secondary school.

Widman, Camilla Villemo January 2020 (has links)
Syftet med detta arbete är att studera den mer eller mindre medvetna litteraturkanon som skapas genom lärares val av litteratur i undervisningen inom svenskämnet för årskurs 7–9 och gymnasieskolan. För att uppnå syftet genomfördes en enkätundersökning som en grund för läromedels- och antologianalys av de verk som svensklärarna nämnde i enkäten. Studien visar att svensklärarnas texturval påverkas av olika faktorer såsom läromedel, antologier, tillgänglighet, kollegor, internet samt egna erfarenheter och kunskap. Läromedelsförfattare och antologiredaktörer har en stor makt över svenskämnet och litteraturundervisningen då deras val och preferenser resulterar sedan i ett texturval som används i svenska skolorna. Dessutom tyder studien på att lärare bidrar till att skapa en informell klassrumskanon genom de skönlitterära verk som väljs ut och som inte ingår i antologier eller läromedel. / The purpose of this work is to study the, more or less conscious, canon of literature that is created through teachers' choice of literature in teaching within the Swedish subject for grades 7–9 and upper secondary school. In order to achieve the purpose, a survey was conducted as a basis for teaching aids and anthology analysis of the works mentioned by the Swedish teachers in the survey. The study shows that the Swedish teachers' text choices are influenced by various factors such as teaching aids, anthologies, accessibility, colleagues, the internet and their own experiences and knowledge. Teaching aids writers and anthology editors have a great power over the Swedish subject and literature teaching as their choices and preferences then result in a text choice used in Swedish schools. In addition, the study suggests that teachers contribute to creating an informal classroom canon through the fiction works selected and not included in anthologies or teaching aids.
33

”Jag känner att jag nått någon form av glastak” : En studie av orsakerna till att redan yrkesverksamma personer väljer att börja studera / ”I feel like I’ve reached some kind of glass ceiling” : A study of the reasons why people who are employed choose to start studying

Johansson, Oskar January 2023 (has links)
The main purpose of this study has been to investigate the reasons of the people in a managerial position who start studying even though they are already employed. Whether there are factors in the Swedish labor market that influence their endeavors to start study is also questioned. The study is conducted by using a qualitative interview method with part- time students who work full-time in a managerial position. The informants have suggested as their main reason to study as their desire to acquire educational credentials. After having reached a managerial position in the workplace or to look for new jobs outside of the current job, a university education or degree is usually required. To be able to continue working during their studies the employees have chosen to study part-time and at distance even though their conditions may vary. Some are prepared to reduce their working hours whereas others study during their working hours, but their course literature is paid by their employers. Thereby it can be argued that human capital theory holds but with an emphasis on credentialism.
34

Training trends signal a middle-skill gap: A quantitative study of training dollars spent in Central Ohio

O'Donnell, Kelly Ann 03 June 2023 (has links)
No description available.
35

The employability of State FFA Degree recipients in Alabama

Johnson, Kailee D. 09 August 2022 (has links) (PDF)
Many high schools have shifted from comprehensive graduation exams to a focus on College and Career Readiness. A common method used to determine when a student is college and career ready is a Career Readiness Indicator (CRI). Many CRIs demonstrate a benchmark learning goal for students. Among academic-based CRIs are Career and Technical Education (CTE) industry credentials. Credentials are just one way that agriculture classrooms contribute to student success. This study compiled existing research on CRIs and employability skills in CTE students to determine how the State FFA Degree could potentially fit into this category as well as highlight specific employability aspects of FFA members that coincide with the three-circle model of agricultural education. Data were collected and analyzed to compare FFA members to non-FFA members. FFA members who have earned their State FFA Degree were additionally compared to FFA members who did not earn the State FFA Degree.
36

Impact Of The Education Level Of Voluntary Prekindergarten Teachers Upon Kindergarten Student Readiness Rates

Wright, Teresa 01 January 2012 (has links)
This study addressed the problem of insufficient information concerning the impact of variability in requirements and credentials for Florida Voluntary Prekindergarten (VPK) teachers statewide on VPK program quality. This study examined the variance in the professional credentials of VPK lead instructors in Florida school districts and whether or not this variability makes a significant difference in program quality as measured by VPK Provider Kindergarten Readiness Rates. Analysis of variance (ANOVA) and analysis of covariance (ANCOVA) statistical tests were conducted, as appropriate, for each of four research questions. Research findings indicated there was no statistically significant difference in the mean VPK Provider Kindergarten Readiness Rates based on the professional credentials for VPK lead instructors when controlling for the socio-economic status of the children enrolled at each site. Recommendations were made for future research to replicate the study using a different indicator of program quality, perhaps a measure of student progress throughout the school year. Also, the first groups of students to participate in Florida’s voluntary prekindergarten (VPK) program are now enrolled in upper elementary grades making a longitudinal study both feasible and worthwhile in evaluating the effectiveness of a largescale preschool program. The researcher further recommended that the idea of improving the qualifications of the prekindergarten workforce must persist, supported by continued research and adequate funding.
37

The Impact Of Moving From Sacs Level I To Level Ii Status On Faculty Employment In The Florida College System

Broeker, Christine 01 January 2013 (has links)
The State of Florida legislatively authorizes Florida community colleges to confer workforce-oriented bachelor’s degrees. As part of the legislation, community colleges are required to achieve Level II (baccalaureate-granting) status through Florida’s regional accreditor, the Southern Association of Colleges and Schools-Commission on Colleges (SACS-COC). When moving from SACS Level I to II, former community colleges need to meet the SACS CS 3.7.1 (Qualified Faculty), which requires that faculty who teach baccalaureate courses hold the minimum of a master’s degree in field. Further complicating matters, as baccalaureate granting institutions, colleges must also comply with CS 3.5.4, requiring 25% of course hours in the baccalaureate degree major to be taught by terminally-degreed faculty. The purpose of this study was to identify what issues related to faculty credentials, if any, have been observed by Florida’s community colleges as part of the process to gain SACS-COC Level II status. Results were analyzed through the lens of Travis Hirschi’s Social Control Theory. The results of this study indicate that colleges have reported changes in faculty employment after implementing the community college baccalaureate. The most common types of changes included requirements for faculty to complete additional graduate coursework and moving faculty to different programs with different conditions for credentialing. Other types of changes reported included faculty terminations and retirements. The study found strong evidence supporting the notion that finding terminally-degreed faculty is a problem for institutions moving from Level I to Level II status particularly in the fields of nursing and computer science/information technology. iv The findings indicate that as Florida’s community college baccalaureate programs continue to expand, colleges will need to find creative solutions to address SACS CS 3.5.4 requirement of terminal degrees for faculty
38

A conceptual decentralized identity solution for state government

Duclos, Martin 08 December 2023 (has links) (PDF)
In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital identity management in the public sector, discusses existing practices, presents the SSI framework as a solution, and outlines potential future research areas.
39

Assessing New Dimensions of an Organization's Learning Culture

Scott, Jennifer Lyne 05 1900 (has links)
Work-based and employee-driven informal learning, training and development have been increasing in importance in the last few decades. Concurrently, organizations seek to measure the extent to which they develop a culture and structure that supports individual learning and organizational learning. This study develops and validates a scale that can measure the extent to which an organization is perceived to provide online learning that is personalized for its employees and perceived to recognize skills and competencies acquired through non-degree and other pathways. This research can provide organizations with the ability to measure and benchmark attributes of their learning culture that are important to work-based and lifelong learning as well as talent recruitment and management.
40

Kryptografická ochrana digitální identity / Cryptographic Protection of Digital Identity

Dzurenda, Petr January 2019 (has links)
Dizertační práce se zabývá kryptografickými schématy zvyšující ochranu soukromí uživatelů v systémech řízení přístupu a sběru dat. V současnosti jsou systémy fyzického řízení přístupu na bázi čipových karet využívány téměř dennodenně většinou z nás, například v zaměstnání, ve veřejné dopravě a v hotelech. Tyto systémy však stále neposkytují dostatečnou kryptografickou ochranu a tedy bezpečnost. Uživatelské identifikátory a klíče lze snadno odposlechnout a padělat. Funkce, které by zajišťovaly ochranu soukromí uživatele, téměř vždy chybí. Proto je zde reálné riziko možného sledovaní lidí, jejich pohybu a chovaní. Poskytovatelé služeb nebo případní útočníci, kteří odposlouchávají komunikaci, mohou vytvářet profily uživatelů, ví, co dělají, kde se pohybují a o co se zajímají. Za účelem zlepšení tohoto stavu jsme navrhli čtyři nová kryptografická schémata založená na efektivních důkazech s nulovou znalostí a kryptografii eliptických křivek. Konkrétně dizertační práce prezentuje tři nová autentizační schémata pro využití v systémech řízení přístupu a jedno nové schéma pro využití v systémech sběru dat. První schéma využívá distribuovaný autentizační přístup vyžadující spolupráci více RFID prvků v autentizačním procesu. Tato vlastnost je výhodná zvláště v případech řízení přístupu do nebezpečných prostor, kdy pro povolení přístupu uživatele je nezbytné, aby byl uživatel vybaven ochrannými pomůckami (se zabudovanými RFID prvky). Další dvě schémata jsou založena na atributovém způsobu ověření, tj. schémata umožňují anonymně prokázat vlastnictví atributů uživatele, jako je věk, občanství a pohlaví. Zatím co jedno schéma implementuje efektivní revokační a identifikační mechanismy, druhé schéma poskytuje nejrychlejší verifikaci držení uživatelských atributů ze všech současných řešení. Poslední, čtvrté schéma reprezentuje schéma krátkého skupinového podpisu pro scénář sběru dat. Schémata sběru dat se používají pro bezpečný a spolehlivý přenos dat ze vzdálených uzlů do řídící jednotky. S rostoucím významem chytrých měřičů v energetice, inteligentních zařízení v domácnostech a rozličných senzorových sítí, se potřeba bezpečných systémů sběru dat stává velmi naléhavou. Tato schémata musí podporovat nejen standardní bezpečnostní funkce, jako je důvěrnost a autentičnost přenášených dat, ale také funkce nové, jako je silná ochrana soukromí a identity uživatele či identifikace škodlivých uživatelů. Navržená schémata jsou prokazatelně bezpečná a nabízí celou řadu funkcí rozšiřující ochranu soukromí a identity uživatele, jmenovitě se pak jedná o zajištění anonymity, nesledovatelnosti a nespojitelnosti jednotlivých relací uživatele. Kromě úplné kryptografické specifikace a bezpečnostní analýzy navržených schémat, obsahuje tato práce také výsledky měření implementací jednotlivých schémat na v současnosti nejpoužívanějších zařízeních v oblasti řízení přístupu a sběru dat.

Page generated in 0.0503 seconds