• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 929
  • 358
  • 270
  • 234
  • 128
  • 69
  • 64
  • 58
  • 46
  • 38
  • 34
  • 13
  • 12
  • 9
  • 9
  • Tagged with
  • 2710
  • 569
  • 397
  • 351
  • 286
  • 247
  • 242
  • 241
  • 238
  • 236
  • 234
  • 228
  • 222
  • 197
  • 197
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
391

Versatile Montgomery Multiplier Architectures

Gaubatz, Gunnar 30 April 2002 (has links)
Several algorithms for Public Key Cryptography (PKC), such as RSA, Diffie-Hellman, and Elliptic Curve Cryptography, require modular multiplication of very large operands (sizes from 160 to 4096 bits) as their core arithmetic operation. To perform this operation reasonably fast, general purpose processors are not always the best choice. This is why specialized hardware, in the form of cryptographic co-processors, become more attractive. Based upon the analysis of recent publications on hardware design for modular multiplication, this M.S. thesis presents a new architecture that is scalable with respect to word size and pipelining depth. To our knowledge, this is the first time a word based algorithm for Montgomery's method is realized using high-radix bit-parallel multipliers working with two different types of finite fields (unified architecture for GF(p) and GF(2n)). Previous approaches have relied mostly on bit serial multiplication in combination with massive pipelining, or Radix-8 multiplication with the limitation to a single type of finite field. Our approach is centered around the notion that the optimal delay in bit-parallel multipliers grows with logarithmic complexity with respect to the operand size n, O(log3/2 n), while the delay of bit serial implementations grows with linear complexity O(n). Our design has been implemented in VHDL, simulated and synthesized in 0.5μ CMOS technology. The synthesized net list has been verified in back-annotated timing simulations and analyzed in terms of performance and area consumption.
392

Servi?o ao cliente: uma avalia??o do n?vel de servi?o log?stico oferecido por uma empresa de bens de consumo / Customer Service: an assessment of the level of logistics services offered to key customers in a consumer goods company

Rodrigues, Raphael Rossi 17 February 2011 (has links)
Submitted by Sandra Pereira (srpereira@ufrrj.br) on 2016-09-20T16:57:48Z No. of bitstreams: 1 2011 - Raphael Rossi Rodrigues.pdf: 1927039 bytes, checksum: d62f71cc9d072958cd804d56ebe97f8a (MD5) / Made available in DSpace on 2016-09-20T16:57:48Z (GMT). No. of bitstreams: 1 2011 - Raphael Rossi Rodrigues.pdf: 1927039 bytes, checksum: d62f71cc9d072958cd804d56ebe97f8a (MD5) Previous issue date: 2011-02-17 / This survey was conducted in a multinational company that operates in the sector of nondurable consumer goods in the international context through the licensing of its brands. Companies that have the right to produce and distribute licensed products are named bottlers. The aim of this study was to measure 13 bottlers in the level of development of logistics Customer Service activities for Key Accounts clients, for it was developed a diagnostic tool based on the available literature on the subject. This diagnostic tool was used in three rounds of assessment in order to check the evolution of the bottlers maturity level of logistics Customer Service activities. They also identified and discussed a series of logistic activities of Customer Service based on a visit in a multinational food industry considered benchmarking in these activities. The diagnostic results show that there was an evolution of the maturity level of logistics Customer Service activities over time, however this trend was not uniform, resulting in a higher variance when comparing the levels of development of all bottlers in the first assessment with the levels obtained in the third and final evaluation. / Esta pesquisa foi realizada em uma empresa multinacional que atua no setor de bens de consumo n?o dur?veis no contexto internacional atrav?s do licenciamento de suas marcas. As empresas que possuem o direito de produzir e distribuir os produtos licenciados s?o denominados fabricantes. O objetivo desta pesquisa foi mensurar em 13 fabricantes o n?vel de desenvolvimento das atividades de Customer Service log?stico para clientes-chave, para isso foi desenvolvida uma ferramenta de diagn?stico com base na literatura dispon?vel sobre o tema. Esta ferramenta de diagn?stico foi utilizada em tr?s rodadas de avalia??o com o objetivo de verificar a evolu??o do n?vel de maturidade das atividades de Customer Service Log?stico nos fabricantes. Tamb?m foi identificada e comentada uma s?rie de atividades de Customer Service log?stico com base em uma visita realizada em uma multinacional do setor de alimentos considerada benchmarking nestas atividades. Os resultados do diagn?stico mostram que houve uma evolu??o do n?vel de maturidade das atividades de Customer Service log?stico ao longo do tempo, entretanto esta evolu??o n?o foi uniforme, o que resultou em uma maior vari?ncia quando comparamos os n?veis de desenvolvimento de todos os fabricantes na primeira avalia??o com os n?veis obtidos na terceira e ?ltima avalia??o.
393

Managing Performance Measurement : A study of how to select and implement performance measures on a strategic, tactical and operational level

Rolfsdotter Karlsson, Annika January 2008 (has links)
<p>The main purpose of this study is to define important criteria to consider when selecting and implementing performance measures on a strategic, tactical and operational level. The thesis is built around the questions "What to measure" and "How to measure". Generally within the thesis the question of "what" concerns different frameworks and working procedures that can be used to determine what to measure, while the question of "how" concerns criteria to consider when implementing performance measures, such as how to design measure formulas and targets, how to communicate measures, etc.</p><p>The study has been conducted as a qualitative study, where the empirical data has been collected through interviews and by using information material from the case company. The purpose of the case study was to test the theoretical framework. The studied case company was Sandvik Process Systems, a product area within the Sandvik group. The case study was complemented by two minor comparative studies of companies also belonging to the Sandvik group. In total the study comprised interviews with 15 persons within different organizational levels.</p><p>Several different frameworks aiming to help organizations to answer the question of what to measure have been developed during the last decades. The frameworks differ more or less, but theorists appear to agree on several matters. My conclusions of the most important criteria to be taken into consideration when answering the question of what to measure is:</p><p>* Complement the outcome measures, i.e. the financial measures that show the results from past efforts, by pro-active performance drivers - the measures that drive the future performance</p><p>* Ensure linkage between performance measures and company vision and strategic objectives</p><p>* Involve the co-workers in the process of developing measures</p><p>* Use an overall comprehensive view and methodic approach</p><p>* Limit the amount of measures</p><p>* Retain the methodic approach – manage the performance measurement system</p><p>After answering the question of what to measure there are also a number of important criteria to consider when it comes to how to measure and implement measures into the organization:</p><p>* Define measure purposes</p><p>* Assign reasonable targets to the measures</p><p>* Consider the field of application when designing a performance measure</p><p>* Communicate the performance measures</p><p>* Specify the measures</p><p>Despite attempting to simplify a complicated reality the frameworks aiming to help organizations to select measures are all rather complex. Hence, to develop and implement a PMS (Performance Measurement System) by the book will imply an extensive project for any company. How time- and resource demanding the project will become will differ from one company to another. Thus, a general conclusion of this study is that a company must start out from its own conditions in order for the development and implementation not to become too complex a project, where the organization loses focus and fails to manage the project all the way through.</p><p>Companies must consider factors such as the size and complexity of the organization, how the business is controlled and managed as well as the structure and control of an already existing PMS. For large organizations, already possessing a rather unstructured PMS, the best approach could be to look upon the development as a constantly on-going activity in the spirit of continuous improvements, rather than a complex project running over a limited time. A vital success factor is also to communicate the intentions to the whole organization at an early stage. If the whole organization is aware of the intention and the purpose this will facilitate the process of developing and implementing a successful PMS.</p>
394

Inter-Domain Identity-Based Key Agreement Schemes

Hsu, Tuan-hung 07 September 2007 (has links)
Recently, many identity-based two-party and three-party key agreement schemes were proposed based on pairing cryptosystems. Multi-party (including more than three parties) key agreement protocols, which are called conference key schemes, can be applied to distributed systems and wireless environments such as Ad hoc networks. However, it is not easy to extend two or three-party schemes to multi-party ones with the guarantee of efficiency and security. In addition to the above two properties, inter-domain environments should also be considered in identity-based key agreement systems. However, only few identity-based multi-party conference key agreement schemes in single domain were proposed in the literature and they did not satisfy all of the security attributes such as forward secrecy and withstanding impersonation. In this thesis, we will propose a novel efficient single-domain identity-based multi-party conference key scheme and extend it to an inter-domain version. Finally, we will prove that the proposed schemes satisfy the required security attributes via formal methods.
395

Authentication and Key Exchange in Mobile Ad Hoc Networks

Hoeper, Katrin 09 1900 (has links)
Over the past decade or so, there has been rapid growth in wireless and mobile applications technologies. More recently, an increasing emphasis has been on the potential of infrastructureless wireless mobile networks that are easy, fast and inexpensive to set up, with the view that such technologies will enable numerous new applications in a wide range of areas. Such networks are commonly referred to as mobile ad hoc networks (MANETs). Exchanging sensitive information over unprotected wireless links with unidentified and untrusted endpoints demand the deployment of security in MANETs. However, lack of infrastructure, mobility and resource constraints of devices, wireless communication links and other unique features of MANETs induce new challenges that make implementing security a very difficult task and require the design of specialized solutions. This thesis is concerned with the design and analysis of security solutions for MANETs. We identify the initial exchange of authentication and key credentials, referred to as pre-authentication, as well as authentication and key exchange as primary security goals. In particular, the problem of pre-authentication has been widely neglected in existing security solutions, even though it is a necessary prerequisite for other security goals. We are the first to classify and analyze different methods of achieving pairwise pre-authentication in MANETs. Out of this investigation, we identify identity-based cryptographic (IBC) schemes as well-suited to secure MANET applications that have no sufficient security solutions at this time. We use pairing-based IBC schemes to design an authentication and key exchange framework that meets the special requirements of MANETs. Our solutions are comprised of algorithms that allow for efficient and secure system set up, pre-authentication, mutual authentication, key establishment, key renewal, key revocation and key escrow prevention. In particular, we present the first fully self-organized key revocation scheme for MANETs that does not require any trusted third party in the network. Our revocation scheme can be used to amend existing IBC solutions, be seamlessly integrated in our security framework and even be adopted to conventional public key solutions for MANETs. Our scheme is based on propagated accusations and once the number of received accusations against a node reaches a defined threshold, the keys of the accused nodes are revoked. All communications are cryptographically protected, but unlike other proposed schemes, do not require computationally demanding digital signatures. Our scheme is the first that efficiently and securely enables nodes to revoke their own keys. Additionally, newly joining nodes can obtain previous accusations without performing computationally demanding operations such as verifying digital signatures. Several security and performance parameters make our scheme adjustable to the hostility of the MANET environment and the degree of resource constraints of network and devices. In our security analysis we show how security parameters can be selected to prevent attacks by colluding nodes and roaming adversaries. In our proposed security framework, we utilize special properties of pairing-based keys to design an efficient and secure method for pairwise pre-authentication and a set of ID-based authenticated key exchange protocols. In addition, we present a format for ID-based public keys that, unlike other proposed formats, allows key renewal before the start of a new expiry interval. Finally, we are the first to discuss the inherent key escrow property of IBC schemes in the context of MANETs. Our analysis shows that some special features of MANETs significantly limit the escrow capabilities of key generation centers (KGCs). We propose a novel concept of spy nodes that can be utilized by KGCs to increase their escrow capabilities and analyze the probabilities of successful escrow attacks with and without spy nodes. In summary, we present a complete authentication and key exchange framework that is tailored for MANET applications that have previously lacked such security solutions. Our solutions can be implemented using any pairing-based IBC scheme. The component design allows for the implementation of single schemes to amend existing solutions that do not provide certain functionalities. The introduction of several security and performance parameters make our solutions adjustable to different levels of resource constraints and security needs. In addition, we present extensions that make our solutions suitable for applications with sporadic infrastructure access as envisioned in the near future.
396

Authentication and Key Exchange in Mobile Ad Hoc Networks

Hoeper, Katrin 09 1900 (has links)
Over the past decade or so, there has been rapid growth in wireless and mobile applications technologies. More recently, an increasing emphasis has been on the potential of infrastructureless wireless mobile networks that are easy, fast and inexpensive to set up, with the view that such technologies will enable numerous new applications in a wide range of areas. Such networks are commonly referred to as mobile ad hoc networks (MANETs). Exchanging sensitive information over unprotected wireless links with unidentified and untrusted endpoints demand the deployment of security in MANETs. However, lack of infrastructure, mobility and resource constraints of devices, wireless communication links and other unique features of MANETs induce new challenges that make implementing security a very difficult task and require the design of specialized solutions. This thesis is concerned with the design and analysis of security solutions for MANETs. We identify the initial exchange of authentication and key credentials, referred to as pre-authentication, as well as authentication and key exchange as primary security goals. In particular, the problem of pre-authentication has been widely neglected in existing security solutions, even though it is a necessary prerequisite for other security goals. We are the first to classify and analyze different methods of achieving pairwise pre-authentication in MANETs. Out of this investigation, we identify identity-based cryptographic (IBC) schemes as well-suited to secure MANET applications that have no sufficient security solutions at this time. We use pairing-based IBC schemes to design an authentication and key exchange framework that meets the special requirements of MANETs. Our solutions are comprised of algorithms that allow for efficient and secure system set up, pre-authentication, mutual authentication, key establishment, key renewal, key revocation and key escrow prevention. In particular, we present the first fully self-organized key revocation scheme for MANETs that does not require any trusted third party in the network. Our revocation scheme can be used to amend existing IBC solutions, be seamlessly integrated in our security framework and even be adopted to conventional public key solutions for MANETs. Our scheme is based on propagated accusations and once the number of received accusations against a node reaches a defined threshold, the keys of the accused nodes are revoked. All communications are cryptographically protected, but unlike other proposed schemes, do not require computationally demanding digital signatures. Our scheme is the first that efficiently and securely enables nodes to revoke their own keys. Additionally, newly joining nodes can obtain previous accusations without performing computationally demanding operations such as verifying digital signatures. Several security and performance parameters make our scheme adjustable to the hostility of the MANET environment and the degree of resource constraints of network and devices. In our security analysis we show how security parameters can be selected to prevent attacks by colluding nodes and roaming adversaries. In our proposed security framework, we utilize special properties of pairing-based keys to design an efficient and secure method for pairwise pre-authentication and a set of ID-based authenticated key exchange protocols. In addition, we present a format for ID-based public keys that, unlike other proposed formats, allows key renewal before the start of a new expiry interval. Finally, we are the first to discuss the inherent key escrow property of IBC schemes in the context of MANETs. Our analysis shows that some special features of MANETs significantly limit the escrow capabilities of key generation centers (KGCs). We propose a novel concept of spy nodes that can be utilized by KGCs to increase their escrow capabilities and analyze the probabilities of successful escrow attacks with and without spy nodes. In summary, we present a complete authentication and key exchange framework that is tailored for MANET applications that have previously lacked such security solutions. Our solutions can be implemented using any pairing-based IBC scheme. The component design allows for the implementation of single schemes to amend existing solutions that do not provide certain functionalities. The introduction of several security and performance parameters make our solutions adjustable to different levels of resource constraints and security needs. In addition, we present extensions that make our solutions suitable for applications with sporadic infrastructure access as envisioned in the near future.
397

Värdeskapand till följd av Key Account Management / Value creation and Key Account Management

Laghamn, Madelene, Törnblom, Lovisa January 2012 (has links)
Bakgrund: Logiken bakom Key Account Management (KAM) bygger på att en liten andel av ett företags kunder står för den största delen av dess intäkter. Vid KAM väljer företag ut dessa strategiskt mest viktiga kunder, kallade nyckelkunder och tillägnar dessa mer resurser och uppmärksamhet jämfört med de ordinarie. Dock har litteraturen om KAM inte i någon större utsträckning berört vilket värde som skapas till följd av KAM eller hur detta värde kan mätas. Därav ligger examensarbetets huvudfokus inom detta forskningsområde inom detta område och fokus ligger framförallt på det säljande företagets perspektiv. Syfte: Syftet med detta examensarbete är att undersöka, analysera och beskriva vilket värde samt hur detta skapas för det säljande företaget genom användningen av KAM. Genomförande: En egen definition av KAM har skapats i detta examensarbete med hjälp av existerande litteratur inom området. Denna definition har sedan tillsammans med examensarbetets syfte legat till grund för den analysmodell som har tagits fram. Analysmodellen har använts för att underlätta empiriinsamlingen och analysen som leder fram till examensarbetets slutsatser. Empiriinsamlingen har skett genom intervjuer med respondenter från de tre fallföretagen Toyota Material Handling, Ericsson AB och Scania CV AB. Slutsats: Som fördelar av KAM har bland annat förbättrade relationer, nöjdare kunder, ökad absolut försäljning och ökad marknadsandel hittats. Potentiella problem och nackdelar med KAM som uppkommit i litteraturen och under intervjuerna är till exempel organisatorisk komplexitet, ökat beroende till nyckelkunderna, att det kräver mycket personal och att interna konflikter kan uppstå. Att mäta dessa typer av fördelar och nackdelar, visar både referensramen och empirin är något som inte görs helt enkelt och intuition och känsla är vanligt vid en utvärdering av det värde som skapas av KAM. Den sammanlagda uppfattningen är att bedömningen av KAM och dess lämplighet, görs på känsla vilket enligt författarna till examensarbetet är otillräckligt. / Background: The logic behind Key Account Management (KAM) lies in the fact that a small part of the customers represents the biggest part of a company’s revenues. Through the work with KAM, companies choose its strategically most important customers; its so called key accounts and dedicate these more resources than compared to others. However, the literature in KAM, have not enough raised the question, which value that is created through this way of working nor how this value can be measured. Therefore, the main focus of this study is within this field of study and it is pursued through the eyes of the selling company. Aim: The aim of this study is to explore, analyze and describe which value and how this is created for the selling company through the work with KAM and furthermore how this can be measured. Completion: Through the use of already existing literature, within the field, an own definition has been created. This definition has together with the aim set the framework for the model for analyses that has been created. The model has been used to facilitate the data collection and leads to the conclusions of this study. The empirical work of this study contains of interviews from three companies; Toyota Material Handling Sweden, Ericsson AB and Scania CV AB. Conclusion: Among others, benefit in terms of improved relationships, more satisfied customers, increased sales and increased market share have been seen. Potential problems have been seen in the literature as well as during the interviews in terms of for example an organizational complexity, increased dependence on the key accounts and internal conflicts that may arise.  Measuring these types of benefits and disadvantages is not done easily and intuition is commonly used assessing the value that is created through the work with KAM. The total judgment is that KAM and its appropriateness is made by a feeling which is not enough according to the authors.
398

A survey and security strength classification of PKI certificate revocation management implementations /

MacMichael, John L. January 2003 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, December 2003. / Thesis advisor(s): J.D. Fulp, D.F. Warren. Includes bibliographical references. Also available online.
399

Forward security and certificate management in mobile AD Hoc networks

Go, Hiu-wing., 吳曉頴. January 2004 (has links)
published_or_final_version / abstract / toc / Computer Science and Information Systems / Master / Master of Philosophy
400

Managing Performance Measurement : A study of how to select and implement performance measures on a strategic, tactical and operational level

Rolfsdotter Karlsson, Annika January 2008 (has links)
The main purpose of this study is to define important criteria to consider when selecting and implementing performance measures on a strategic, tactical and operational level. The thesis is built around the questions "What to measure" and "How to measure". Generally within the thesis the question of "what" concerns different frameworks and working procedures that can be used to determine what to measure, while the question of "how" concerns criteria to consider when implementing performance measures, such as how to design measure formulas and targets, how to communicate measures, etc. The study has been conducted as a qualitative study, where the empirical data has been collected through interviews and by using information material from the case company. The purpose of the case study was to test the theoretical framework. The studied case company was Sandvik Process Systems, a product area within the Sandvik group. The case study was complemented by two minor comparative studies of companies also belonging to the Sandvik group. In total the study comprised interviews with 15 persons within different organizational levels. Several different frameworks aiming to help organizations to answer the question of what to measure have been developed during the last decades. The frameworks differ more or less, but theorists appear to agree on several matters. My conclusions of the most important criteria to be taken into consideration when answering the question of what to measure is: * Complement the outcome measures, i.e. the financial measures that show the results from past efforts, by pro-active performance drivers - the measures that drive the future performance * Ensure linkage between performance measures and company vision and strategic objectives * Involve the co-workers in the process of developing measures * Use an overall comprehensive view and methodic approach * Limit the amount of measures * Retain the methodic approach – manage the performance measurement system After answering the question of what to measure there are also a number of important criteria to consider when it comes to how to measure and implement measures into the organization: * Define measure purposes * Assign reasonable targets to the measures * Consider the field of application when designing a performance measure * Communicate the performance measures * Specify the measures Despite attempting to simplify a complicated reality the frameworks aiming to help organizations to select measures are all rather complex. Hence, to develop and implement a PMS (Performance Measurement System) by the book will imply an extensive project for any company. How time- and resource demanding the project will become will differ from one company to another. Thus, a general conclusion of this study is that a company must start out from its own conditions in order for the development and implementation not to become too complex a project, where the organization loses focus and fails to manage the project all the way through. Companies must consider factors such as the size and complexity of the organization, how the business is controlled and managed as well as the structure and control of an already existing PMS. For large organizations, already possessing a rather unstructured PMS, the best approach could be to look upon the development as a constantly on-going activity in the spirit of continuous improvements, rather than a complex project running over a limited time. A vital success factor is also to communicate the intentions to the whole organization at an early stage. If the whole organization is aware of the intention and the purpose this will facilitate the process of developing and implementing a successful PMS.

Page generated in 0.0424 seconds