• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 930
  • 358
  • 270
  • 234
  • 128
  • 69
  • 64
  • 58
  • 46
  • 38
  • 34
  • 13
  • 12
  • 9
  • 9
  • Tagged with
  • 2711
  • 569
  • 397
  • 352
  • 286
  • 247
  • 242
  • 241
  • 238
  • 236
  • 234
  • 229
  • 222
  • 197
  • 197
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
421

Handover optimised authentication scheme for high mobility wireless multicast

Mapoka, Trust T., Shepherd, Simon J., Abd-Alhameed, Raed, Anoh, Kelvin O.O. January 2015 (has links)
No / In this paper a distributed handover optimized authentication scheme based on independent session key per access network (HOISKA) is developed for the decentralized multi-service group key management scheme over wireless mobile multicast. It enables a handover user Mi involved in multiple multicast service subscriptions to securely reuse the long term credential initially issued by the trusted authentication server (As) for deriving unique session keys per access network as it performs handover authentication across various access networks. The distributed nature of the scheme enables offloading the authentication function to the area network controllers (AKDs) such that As is not involved during handover exchange authentication signaling. This simplifies handover by reducing handover exchange signalling constituting to handover delays. Handover Access authentication (HAA) phase in HOISKA is presented then analyzed using the delay analytical model. The model proves efficacy by inducing minimum delays with less handover blocking probability while providing same level of security to the widely deployed handover authentication scheme.
422

Storage Systems and Security Challenges in Telemetry Post Processing Environments

Kalibjian, Jeff 10 1900 (has links)
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California / A common concern in telemetry post-processing environments is adequate disk storage capacity to house captured and post-processed telemetry data. In today's network environments there are many storage solutions that can be deployed to address storage needs. Recent trends in storage systems reveal movement to implement security services in storage systems. After reviewing storage options appropriate for telemetry post-processing environments; the security services such systems typically offer will also be discussed and contrasted with other third party security services that might be implemented directly on top of a networked storage system.
423

Authentication in quantum key growing

Cederlöf, Jörgen January 2005 (has links)
<p>Quantum key growing, often called quantum cryptography or quantum key distribution, is a method using some properties of quantum mechanics to create a secret shared cryptography key even if an eavesdropper has access to unlimited computational power. A vital but often neglected part of the method is unconditionally secure message authentication. This thesis examines the security aspects of authentication in quantum key growing. Important concepts are formalized as Python program source code, a comparison between quantum key growing and a classical system using trusted couriers is included, and the chain rule of entropy is generalized to any Rényi entropy. Finally and most importantly, a security flaw is identified which makes the probability to eavesdrop on the system undetected approach unity as the system is in use for a long time, and a solution to this problem is provided.</p>
424

The Use of eCRM to Enhance Customer Relationship : The Case of Toyota Mahanakorn

Mettagarunagul, Mingruedee, Puengprakiet, Pensiri January 2011 (has links)
Many organizations are familiar with using CRM (Customer relationship management) to manage and enhance the customer relationship. Good customer relationship can bring great benefits and a competitive advantage to organization. And in this era of technology, CRM that consists of eCRM (Electronic customer relationship management) is acknowledged as another potential solution for business.The purpose of this study is to explore what an organization can do to improve the use of eCRM, so eCRM can enhance the customer relationship. In the thesis the authors have studied different eCRM key factors and their relationship in order to improve customer relationship through the use of eCRM.This thesis has used Toyota Mahanakorn, the Toyota dealers in Thailand as a case study for examining the practice of successful eCRM in the organization.Our conclusion is that in order to improve the performance of eCRM, an organization should choose a eCRM technology that suits with organization strategy and practice as well as employees technology and service capabilities.Since this thesis studies the way to improve the use of eCRM in an organization, this thesis will be advantageous to those who plan to implement eCRM in the future and to those who have already implemented eCRM and would like to make it better.
425

Authentication in quantum key growing

Cederlöf, Jörgen January 2005 (has links)
Quantum key growing, often called quantum cryptography or quantum key distribution, is a method using some properties of quantum mechanics to create a secret shared cryptography key even if an eavesdropper has access to unlimited computational power. A vital but often neglected part of the method is unconditionally secure message authentication. This thesis examines the security aspects of authentication in quantum key growing. Important concepts are formalized as Python program source code, a comparison between quantum key growing and a classical system using trusted couriers is included, and the chain rule of entropy is generalized to any Rényi entropy. Finally and most importantly, a security flaw is identified which makes the probability to eavesdrop on the system undetected approach unity as the system is in use for a long time, and a solution to this problem is provided. / ICG QC
426

Key Distribution In Wireless Sensor Networks

Gupta, Abhishek 06 1900 (has links)
In the last few years, wireless sensor networks (WSNs) have become a very actively researched area. The impetus for this spurt of interest were developments in wireless technologies and low-cost VLSI, that made it possible to build inexpensive sensors and actuators. Each such device has limited computational power, memory and energy supply. Nevertheless, because of the low cost, such devices can be deployed in large numbers, and can thereafter form a sensor network. Usually, one or more base stations are also present which act as sink nodes. When sensors are deployed in hostile environments, security becomes an integral part for such type of networks. A first step in this direction is to provide secure communication between any two nodes and between a node and the base station. Since the public key cryptographic techniques are computationally expensive for resource constrained sensors, one need to rely on symmetric key cryptography for secure communication. The distribution and management of cryptographic keys poses a unique challenge in sensor networks. One requires efficient key distribution algorithms for such type of networks. In this thesis, we address the problem of secure path key establishment in wireless sensor networks. We first propose a pairwise key distribution algorithm for probabilistic schemes. Inspired by the recent proxy-based schemes, we introduce a friend-based scheme for establishing pairwise keys securely. We show that the chances of finding friends in a neighbourhood are considerably more than that of finding proxies, leading to lower communication overhead. Further, we prove that the friend-based scheme performs better than the proxy-based scheme both in terms of resilience against node capture as well as in energy consumption for pairwise key establishment. A recent study has shown that the advantages of the probabilistic approach over the deterministic approach, are not as much as people have believed. Thus, we focus our attention on deterministic schemes in which we first discuss why one cannot use the conventional security measure for determining the resilience of a key distribution scheme in case of schemes in which nodes share more than one key. Then, we propose a new and a more general security metric for measuring the resilience of a key distribution scheme in wireless sensor networks. Further, we present a polynomial-based scheme and a novel complete connectivity scheme for distributing keys to sensors and show an analytical comparison, in terms of security and connectivity, between the schemes. Motivated by the schemes, we derive general expressions for the new security measure and the connectivity. A number of conclusions are made using these general expressions. Then, we conclude our work with a number of future directions that can be followed with this piece of work.
427

Key Account Management / Key Account Management

Dvořák, Dalibor January 2008 (has links)
The purpose of the diploma thesis is to identify main activities and responsibilities of key account managers - based on example of Imperial Tobacco CR, s.r.o. company. The theoretical part describes the development of the Czech Retail market from 1989 till 2007. It is focused on international retail chains and it's entrance in the Czech market. Also main trends and possible future development are identified. The practical part provide with detailed characteristics of the Czech tobacco market as well as Imperial Tobacco CR, s.r.o. company - a representative of suppliers. Crucial part is the analysys of activities and responsibilities of Imperial Tobacco's key account managers. The authenticity is guaranteed by real business examples, situations and relationships.
428

En undersökning om end-to-end kryptering av SMS med hjälp av PKCS #1

Danielsson, Mikael January 2020 (has links)
In today’s society, especially after everything that was reported by Edward Snowden when he, during 2013, showed how USA’s NSA worked with global surveillance, there is a great need to keep communication secure. Se- cure both in such a way that the contents in messages are protected from unwanted parties as well as in such a way that messages’ authenticity can be verified. It’s just as important to know who one is communicating with as it is to know that no unauthorized person can read material not meant for them. We see more and more solutions like for instance Let’s Encrypt that offer free encryption for web traffic but when it actually comes to SMS traffic there aren’t as many effective options available. The purpose of this work is to develop a system to examine how one most effectively could treat SMS in a secure and authenticated fashion. The goal is to, contrary to many other solutions, not be dependent upon a third party but rather utilize the existing SMS protocol and to make sure that the con- tents is encrypted by use of public key cryptography. This leads to it being enough to use the application to be able to communicate securely as there would be no central server that could be closed down or in other ways af- fected to lessen the security of the communication. We also get a system that is much less dependent on mobile data and will thus become more flexible in areas where this can be costly or hard to reach. Beyond this a system for verification of external keys will be explored. Even if it, in case the user chooses to use it, will need access to mobile data, it could be a useful tool for authentication of communication with parties with whom one has not been in contact with before since they can publish their public key and then refer to it within the message. An example use case for this would be a gov- ernment needing to publish information to its citizens; then this key can be published on their web site so that anyone easily could verify it (the goal is to have this be done automatically during message retrieval). / I dagens samhälle, särskilt efter bland annat allt som rapporterades av Ed- ward Snowden när han under 2013 påvisade hur USAs NSA jobbade med global övervakning, är det av stor vikt av att kommunikation bör hållas säker. Säker både på så sätt att innehållet i meddelanden skyddas från oön- skade personer och på så sätt att meddelandens autenticitet kan styrkas. Det är minst lika viktigt att veta vem man kommunicerar med som att veta att ingen obehörig kan läsa material som inte är ämnat för dem. Vi ser fler och fler lösningar som till exempel Let’s Encrypt som erbjuder gratis kryptering av webbtrafik men när det gäller just SMS-trafik finns inte lika många och effektiva lösningar. Syftet med det här arbetet är att utveckla ett system för att undersöka hur man på bästa sätt skulle kunna behandla SMS på ett säkert och autentis- erat sätt. Målet är att, till skillnad mot många andra lösningar, inte vara beroende av en tredje part utan istället nyttja det befintliga SMS-protokollet men se till att innehållet är krypterat med hjälp av public key cryptography. Detta leder till att det räcker att använda applikationen för att kunna kom- municera säkert, det finns ingen central server som skulle kunna stängas ner eller på andra sätt påverkas för att försämra kommunikationens säker- het. Vi får också ett system som är mycket mindre beroende av mobildata och blir därför mer flexibelt i områden där dessa kan vara kostsamma eller svåråtkomliga. Utöver detta kommer ett system för extern autentisering av nycklar undersökas. Även om detta, om avsändaren väljer att utnyttja det, kommer att kräva tillgång till mobil datatrafik så skulle det vara ett nyttigt verktyg för att kunna autentisera kommunikation med personer som man aldrig tidigare varit kontakt med då dessa i så fall kan publicera sin nyckel online och sedan hänvisa till den i meddelandet. Exempel på användning för detta är om en myndighet behöver gå ut med information till medbor- garna; då kan denna nyckel publiceras på dess webbsida så att alla enkelt kan kontrollera den (målet är i så fall att detta skall ske automatiskt under hämtning av ett meddelande).
429

The Impact of the Common Data Security Architecture (CDSA) on Telemetry Post Processing Architectures

Kalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada / It is an increasing requirement that commercial satellite telemetry data product be protected from unauthorized access during transmission to ground stations. While the technology (cryptography) to secure telemetry data product is well known, the software infrastructure to support such security is costly, and very customized. Further, many software packages have difficulty interoperating. The Common Data Security Architecture [1] [2] [3] (originally proposed by the Intel Corporation, and now adopted by the Open Group), is a set of common cryptographic [4] and public key infrastructure (PKI) application programming interfaces (APIs) which will facilitate better cryptographic interoperability as well as making cryptographic resources more readily available in telemetry post processing environments.
430

Performance measures : preventive strategies to limit negative secondary behaviour induced in selected incentive-based companies

Coetzee, Johannes Gerhardus, Mathur-Helm, Babita 03 1900 (has links)
Mini-research report presented in partial fulfillment of the requirements for the degree of Master of Business Administration at the University of Stellenbosch. / ENGLISH ABSTRACT: This research report is focused on the phenomenon that various Key Performance Indicators (KPIs) used by an organisation as part of their Performance Management systems in support of their strategic objectives will sometimes also drive non-productive behaviour. Thus although the intention might be that the KPI should promote a specific strategic objective, the very same KPI might drive additional behaviour that might not be aligned with the strategic objectives at all or could even be downright destructive. The purpose of this research study is to develop an analysis methodology that can be used to identify those KPIs that drive negative secondary behaviour (the intended positive behaviour being the primary behaviour). The methodology must also assist in identifying preventive measures that can be used to mitigate the risk posed by the negative behaviour. An interesting aspect of this research report is that it cross-references between the business and engineering disciplines by means of adapting techniques used in engineering to assist with a business management problem. The result of this research is a KPI Effectiveness Analysis that has gone through a trail phase where a number of case studies were analysed by means of this tool. The results were conclusive and the analysis tool found to be of great assistance. / AFRIKAANSE OPSOMMING: Hierdie navorsingsverslag fokus op die verskynsel dat Sleutel Prestasie Indikators (SPI's)wat deur ondernemings gebruik word as deel van hul prestasiebestuur-stelsels en wat ten doel het om die strategiese doelwitte van die onderneming te ondersteun, soms ook nie-produktiewe gedrag bevorder. Dus alhoewel dit die intensie met die SPI mag wees om gedrag te bevorder wat die strategiese doelwitte sal ondersteun, dieselfde SPI ook gedrag kan bevorder wat glad nie die strategiese doelwitte ondersteun nie en dalk self destruktief van aard kan wees. Die doel van hierdie navorsingstudie is om 'n analise metodologie te ontwikkel wat gebruik kan word om die SPI's te identifiseer wat negatiewe sekondêre gedrag bevorder (waar die bedoelde gedrag as die primêre gedrag gesien word). Die metodologie moet ook die identifisering van moontlike voorkomende stappe help fasiliteer wat gebruik kan word om die risiko van negatiewe gedrag te vernminder. 'n Interessante aspek van hierdie navorsingsverslag is dat daar 'n kruisverwysing gedoen word tussen die besigheids- en ingenieursdissipline deur tegnieke wat in die ingenieursrigting gebruik word aan te pas ten einde te help met 'n besigheidsbestuursprobleem. Die resultaat van die navorsing is 'n SPI Effektiwiteitsanalise wat tydens 'n toetsfase in 'n paar gevallestudies geanaliseer is deur hierdie metode te gebruik. Die resultate was konkreet en bewys dat die analise metode van groot hulp is.

Page generated in 0.0916 seconds