• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 927
  • 358
  • 270
  • 233
  • 128
  • 69
  • 64
  • 58
  • 46
  • 38
  • 34
  • 13
  • 12
  • 9
  • 8
  • Tagged with
  • 2706
  • 569
  • 396
  • 350
  • 286
  • 247
  • 242
  • 241
  • 237
  • 236
  • 234
  • 227
  • 222
  • 197
  • 197
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Key establishment --- security models, protocols and usage

Ustaoglu, Berkant January 2008 (has links)
Key establishment is the process whereby two or more parties derive a shared secret, typically used for subsequent confidential communication. However, identifying the exact security requirements for key establishment protocols is a non-trivial task. This thesis compares, extends and merges existing security definitions and models for key establishment protocols. The primary focus is on two-party key agreement schemes in the public-key setting. On one hand new protocols are proposed and analyzed in the existing Canetti-Krawzcyk model. On the other hand the thesis develops a security model and novel definition that capture the essential security attributes of the standardized Unified Model key agreement protocol. These analyses lead to the development of a new security model and related definitions that combine and extend the Canetti-Krawzcyk pre- and post- specified peer models in terms of provided security assurances. The thesis also provides a complete analysis of a one-pass key establishment scheme. There are security goals that no one-pass key establishment scheme can achieve, and hence the two-pass security models and definitions need to be adapted for one-pass protocols. The analysis provided here includes the description of the required modification to the underlying security model. Finally, a complete security argument meeting these altered conditions is presented as evidence supporting the security of the one-pass scheme. Lastly, validation and reusing short lived key pairs are related to efficiency, which is a major objective in practice. The thesis considers the formal implication of omitting validation steps and reusing short lived key pairs. The conclusions reached support the generally accepted cryptographic conventions that incoming messages should not be blindly trusted and extra care should be taken when key pairs are reused.
42

Research on the strategy for small and medium enterprises¡¦ model transition

SU, KUO-TSAIR 17 August 2004 (has links)
­^¤åºK­n(Abstract) Since the government adopted the ¡§ Patience and Goodwill¡¨ policy to decelerate the ongoing industries¡¦ emigration, it inevitably results the deterioration on Taiwan political and economic environments and of being prone to the world factory ¡VChina. We could see that small to medium size companies are facing the dilemma- emigrating to China or stay. All industries in Taiwan have been forced to upgrade either for survive or business longevity This case study based on the competitive advantage theory and it evaluate the strategies incurred during small to medium size companies¡¦ internal upgrading; moreover, further identify its causes, directions and the condition within the whole process to find out the confronting and solution The goal is to find the way out, structure, and module. Herewith provide clear explanation and examination in order to further formulating for subject companies under circumstances of operating and business expansion. Meanwhile, the re-examination and adjustment of the formula either as being references and instruction for subject companies or fundament for future research after long-term operation. In this research analysis, (1) analyses external fastener industry environment and classify the success factors. (2) Analyses the subject company internal structure and characters to identify its key factor to success in the industry, (3) Marketing analysis. By applying the ¡§ Five forces framework and ¡§ SWOT¡¨ in order to- Firstly, realize the potential market opportunity and expanding space; Secondly, try to identify its core competency and competitive advantage. Thirdly, construct its sustainable competitive advantage to maintain its strength and finally lead to development and benefited prolong operation in the market place. The disclose of study: (1) Most of traditional industries have been on the progress of upgrading (2) Most of upgrading traditional manufacturers/suppliers have complete the basic operational upgrading. (3) Observing two tips from the smile curve, the early adopters have been benefited from upgrading changes. (4) The research subject ¡VS company, from a small size trading company to nowadays a multinational company, the continuous upgrading by adoption of positioning strategy is similarly develop toward two sides of the curve and the effects has been appealed. All above findings support there should have a model of best practice be generated for all the subject companies or similar industry reference Key words: sustainable competitive advantages, key success factors, key survival factor.
43

Mobility-Matching Key Management for Secure Group Communications in Wireless Networks

Liang, Li-ling 28 July 2006 (has links)
In this thesis, we propose and analyze a multicast key backbone for secure group communications. We also utilize the correlated relationships between the mobile users in the wireless communications networks. When a batch member joins or leaves the group communications, the system has to update and distribute encryption keys to assure that only active members could receive the latest information. In previous tree-based multicast key management schemes, the depth of the key tree is unbounded and analytically deriving the exact value of the corresponding average update cost remains an open problem. And in previous schemes, the different mobile user arrives in and leaves from the system at different time. In contrast, the depth of the proposed multicast key backbone is fixed and the arriving or leaving users are more than one. We utilize these two characteristics and simulate the system to get the average update cost per time unit. We can find that this scheme can improve the efficiency of the system in some special cases when updating the new key.
44

Installation, configuration and operational testing of a PKI certificate server and its supporting services /

Ambers, Vanessa P. Kelly, Amanda M. January 2004 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2004. / Thesis advisor(s): J.D. Fulp, Dan C. Boger. Includes bibliographical references (p. 159-160). Also available online.
45

Key Factors and Key Obstacles in Global Supply Chain Management : A Study in Demand Planning Process

Wei, Mengdi, Liu, Yang January 2013 (has links)
In Recent years, global supply chain management has been a popular study area due to the economic globalization. This study mainly focus on the demand planning process of demand management in global supply chain management. The purpose of this thesis is to find the key factors and obstacles in demand planning process both in theory and practice, and solutions for the obstacles. Based on many scholar researches, a brief introduction of demand management and demand planning has been made at the beginning of the theoretical framework. Key factors, key obstacles and solutions are collected and clarified from empirical study and scholar researches in the theoretical framework. Qualitative approach is adopted as basic approach. We use case study to do the research and interviews to collect data. A server manufacturer of IBM named ISTC (International System Technology Corporation) is chosen as a case for this research. The key factors, obstacles and improvements of empirical study are compared with the facts of ISTC. New factors, obstacles and their new descriptions are figured out through the comparison between theory and the fact of the case. A suggestion for improvement and solution for the demand planning process is also put forward based on the empirical study and the facts of ISTC by this method.
46

Sustainability in the South African gold mining industry : managing a paradox

Mathibe, Motsiemang Brian Gerard 21 July 2012 (has links)
The history of the gold mining industry and that of South Africa are closely linked and will continue to be so for the foreseeable future. Despite declining production figures in the last decade, the gold mining industry remains a key contributor to economic development in the country. The legitimacy of the industry has been based almost entirely on the financial contribution to the fiscus and job creation. More recently, this legitimacy has been questioned by perceptions of shortcomings in the contribution to sustainable development. The purpose of the research was to gain an enhanced understanding into how the gold mining industry is respond to the challenges of sustainability in South Africa. Through a combination of qualitative interviews and secondary data review, the research had specific aims to: Establish the strategic stances of South African gold mining companies on sustainability Identify key drivers and impediments to implementing sustainability strategies into the day-to-day decision making; establish the maturity levels of the practices adopted by the companies; and establish an approach that can be used to assist South Africa’s gold mining companies embed sustainability in their strategies. By and large, the South African gold mining industry recognises its responsibilities towards society and the ecosystem. However, the focus seems to be more short-term and based on liability, cost and risk reduction. Additionally, there seems to be a gap between intent and actual performance. The Mining Charter and global sustainability frameworks are key drivers in the companies’ response to sustainability challenges.Leadership within the industry, the credibility and trust deficits, and the fragmented approach to sustainable development were identified as major impediments. / Dissertation (MBA)--University of Pretoria, 2012. / Gordon Institute of Business Science (GIBS) / unrestricted
47

Process assessment at LFV - measuring and mapping of the order process / Processutvärdering hos LFV - Kartläggning och framtagning av nyckeltal för orderprocessen

Olingdal, Jakob, Peltomaa, Joni January 2016 (has links)
För verksamheter som arbetar processorienterat är det viktigt att kunna mäta och följa upp verksamhetens processer för att få svar på var man står i nuläget och hur framtida mål kan uppnås. Vid mätning av processer måste man dessutom veta vad som ska mätas, varför man gör det och göra det på rätt sätt. Ett sätt att mäta verksamhetens prestation är med Key Performance Indicators (KPI), mätetal som tagits fram för att möta verksamhetens målsättningar. LFV är ett statligt verk som ansvarar för flygtrafiktjänster i Sverige, och det är på avdelningen för Teknikuppdrag som denna studie utspelar sig. LFV har krav på sig från EU att reducera sina kostnader för flygtrafiktjänster med 2,4 % årligen fram till 2019, vilket öppnar upp för effektiviseringsåtgärder som kan bidra till besparingarna. Studien går ut på att kartlägga och ta fram relevanta KPIer för orderprocessen för produkten flygmätning, för att möjliggöra uppföljning av processen. För att finna lämpliga KPIer har en omfattande litteraturstudie genomförts, därtill har intervjuer med representanter från LFV utförts. Studien resulterade i en ny, korrigerad, processkarta för produkten flygmätning, samt i tre stycken KPIer som kan användas för att följa upp processen. Dessa tre KPIer är Ledtid, Leveransprecision och Andel felfria transaktioner. Utöver detta har även processens design uppmätts enligt mätetal speciellt utformade för detta.
48

High Speed Homodyne Detector for Gaussian-modulated Coherent-state Quantum Key Distribution

Chi, Yuemeng 13 January 2010 (has links)
We developed a high speed homodyne detector in the telecommunication wavelength region for a Gaussian-modulated coherent-state quantum key distribution experiment. We are able to achieve a 100 MHz bandwidth, ultra-low electronic noise and pulse-resolved homodyne detector. The bandwidth of this homodyne detector has reached the same order of magnitude of the best homodyne detectors reported. By overcoming photodiode response functions mismatch, choosing proper laser sources, ensuring the homodyne detector linearity and stabilizing the homodyne detection system, we demonstrate that the homodyne detector has a 10 dB shot-noise-to-electronic-noise ratio in the time domain at a local oscillator of 5.4*10^8 photons/pulse at a laser repetition rate of 10 MHz. With this homodyne detector, we expect to ncrease our GMCS QKD experiment speed by 100 times, which will improve the key generation rate by 1-2 orders of magnitude.
49

High Speed Homodyne Detector for Gaussian-modulated Coherent-state Quantum Key Distribution

Chi, Yuemeng 13 January 2010 (has links)
We developed a high speed homodyne detector in the telecommunication wavelength region for a Gaussian-modulated coherent-state quantum key distribution experiment. We are able to achieve a 100 MHz bandwidth, ultra-low electronic noise and pulse-resolved homodyne detector. The bandwidth of this homodyne detector has reached the same order of magnitude of the best homodyne detectors reported. By overcoming photodiode response functions mismatch, choosing proper laser sources, ensuring the homodyne detector linearity and stabilizing the homodyne detection system, we demonstrate that the homodyne detector has a 10 dB shot-noise-to-electronic-noise ratio in the time domain at a local oscillator of 5.4*10^8 photons/pulse at a laser repetition rate of 10 MHz. With this homodyne detector, we expect to ncrease our GMCS QKD experiment speed by 100 times, which will improve the key generation rate by 1-2 orders of magnitude.
50

Deneme Titile

Yucesoy, Koksal 01 November 2011 (has links) (PDF)
AABS

Page generated in 0.0743 seconds