Search results for "Crypt"

showing 10 items of 1111 documents

Urban Surface Energy Balance Models: Model Characteristics and Methodology for a Comparison Study

2009

Many urban surface energy balance models now exist. These vary in complexity from simple schemes that represent the city as a concrete slab, to those which incorporate detailed representations of momentum and energy fluxes distributed within the atmospheric boundary layer. While many of these schemes have been evaluated against observations, with some models even compared with the same data sets, such evaluations have not been undertaken in a controlled manner to enable direct comparison. For other types of climate model, for instance the Project for Intercomparison of Land-Surface Parameterization Schemes (PILPS) experiments (Henderson-Sellers et al., 1993), such controlled comparisons hav…

Urban surfacePhysicsHeat fluxMeteorologyPlanetary boundary layerLatent heatEnergy balanceKey (cryptography)Climate modelUrban heat islandIndustrial engineering
researchProduct

Supporting Relational Processing in Complex Animated Diagrams

2008

The psychological utility of different approaches to cueing key information within complex animated diagrams remains relatively unexplored. Because of the varied processing demands required to comprehend such representations, it is likely that providing a range of different cue types would be best for supporting effective user information extraction. Traditional cueing approaches used with static diagrams may need to be reconsidered in order to meet the new design challenges associated with their animated counterparts.

User informationRange (mathematics)MultimediaComputer scienceKey (cryptography)computer.software_genrecomputer
researchProduct

Secure Group Communication Using Fractional Public Keys

2010

Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424TheoryofComputation_MISCELLANEOUSScheme (programming language)business.industryComputer scienceKey spaceTheoryofComputation_GENERALCryptographyPublic-key cryptographySymmetric-key algorithmCommunication in small groupsCollusionbusinessKey managementcomputerComputer networkcomputer.programming_language2010 International Conference on Availability, Reliability and Security
researchProduct

Statistical Analysis of the (In)efficiency of Bitcoin : A comparison of the weak form efficient market hypothesis in the US and Venezuela

2019

Master's thesis Business Administration BE501 - University of Agder 2019 Bitcoin is a phenomenon that has received a lot of attentionduringthe last years. Although the literature on the subject has expanded, there is still need for more research. This paper replicates the work of Urquhart (2016) and examines whether there isevidence ofweak form efficiency in the Bitcoin market. He found that the Bitcoin market in the US showed signs of moving towards weak form efficiency. We contribute to the existing literature by adding recentdata and comparing two different markets;the USand Venezuela. To obtain robustness of the results, the analysis is conducted by performing six different statistical …

VDP::Samfunnsvitenskap: 200::Økonomi: 210efficient market hypothesisi.i.d.statistical analysisBE501long memory randomnessBitcoincryptocurrency
researchProduct

Investigation of data encryption impact on broadcasting visible light communications

2014

Este trabajo investiga el impacto de la encriptación y desencriptación de datos en un sistema de comunicaciones de luz visible (VLC) de difusión en interiores incrustado en la capa física. Se ha implementado el cifrado RSA para proporcionar una transmisión de datos segura en la capa física. El artículo muestra el rendimiento de la tasa de error de bits (BER) para los sistemas VLC seguros y no seguros (8 y 12 bits) para velocidades de datos de 2 y 12 Mbps. Para una BER de 10e-4 mostramos que hay penalizaciones de potencia de 2-4 dB con las VLC seguras. También se investiga el impacto de la longitud de la clave en la propagación del error y la penalización de potencia. EU Cost Action IC1101 T…

VLCUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicacionesBERbusiness.industryComputer sciencedecryptionPhysical layerVisible light communicationpower penaltyEncryptionUNESCO::MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación:CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicaciones [UNESCO]Broadcasting (networking)RSABroadcast communication networkBit error rate:MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación [UNESCO]businessComputer hardwareencryptionKey sizeComputer networkData transmission
researchProduct

Bitcoin kā norēķinu sistēma Telia Latvija uzņēmumā

2017

Mūsdienu globalizācijas apstākļos arvien vairāk naudas tiek pārskaitīta starptautiskos pārskaitījumos. Šādu pārskaitījumu veikšana izmaksā aptuveni 5% no kopējās pārskaitījuma summas, kā arī tie parasti aizņem vismaz pāris dienas, kas apgrūtina darījumu veikšanu starptautiskā līmenī. Bitcoin ir decentralizēta kriptovalūta, ar kuras palīdzību ir iespējams veikt pārskaitījumus bez distances ierobežojumiem caur internetu. Bitcoin pārskaitījumi parasti izmaksā zem 1% no darījuma summas, un pārskaitījums parasti aizņem 5 – 30 minūtes. Šajā darbā tiek apskatītas iespējas izmantot bitcoin pārskaitījumu sistēmu telekomunikāciju uzņēmuma SIA Telia Latvija interneta pakalpojumu norēķinam. Tiek analiz…

Vadībzinātnekriptovalūtabitcoinnorēķinu sistēmacryptocurrency
researchProduct

A Novel Model for E-Business and E-Government Processes on Social Media

2013

Abstract The global digital economy tends to grow up through the adoption of key technologies, mobility, cloud computing, data mining, artificial intelligence or the extension of social environments. These influences turns up the economy and give rise to new tendencies for obtaining the value. The e-business and e-government strategy is not an easy to organize, although in terms of a fundamental strategy of e-business will be led by the super-expansion of the market. For this reason, the aim of this study is to demonstrate the implications that social media has in the development of electronic business (e-business) and to provide, through a mode, a viable solution to companies or even Gover…

Value (ethics)Electronic businessbusiness.industrySuiteGeneral EngineeringEnergy Engineering and Power TechnologyCloud computingModellingSoftwareKey (cryptography)EconomicsE-GovernmentSocial mediaDigital economyMarketingE-BusinessbusinessIndustrial organizationProcedia Economics and Finance
researchProduct

Co-creation of IT-value in a cluster of small enterprises

2018

Abstract There is a growing emphasis on digital transformation in research and business practice. The creation of value from IT-investments is a critical factor in digital transformation. Research has documented that the ability to realize IT-value is a very challenging endeavor, especially for small enterprises who because of resource poverty are dependent on external input and cooperation with other companies. There is a general lack of research on the phenomenon of how IT-value is co-created, particularly in small firms. This paper reports from a study of a cluster of performing arts organizations, Blender Collective. They realized that audience data is a key issue, and that they lack th…

Value (ethics)Knowledge managementPovertyComputer sciencebusiness.industry05 social sciencesDigital transformationPeer reviewResource (project management)Work (electrical)Phenomenon0502 economics and businessCo-creationKey (cryptography)General Earth and Planetary Sciences050211 marketingPerforming artsbusiness050203 business & managementGeneral Environmental ScienceProcedia Computer Science
researchProduct

Identifying the role of business accelerators in the developing business ecosystem: the life science sector

2020

PurposeBusiness accelerators have recently received increasing attention as important cogs in business ecosystem development. However, their exact role in the ecosystem is not yet well known, especially outside the IT sector. The purpose of this study is, therefore, twofold: to determine the position of life science accelerators in the business ecosystem and the attributes of support for companies and to identify key features of the life science accelerators that contribute to the change in business ecosystems.Design/methodology/approachThe authors offer an exploratory case study of five life science business accelerators and analyze the main factors affecting the companies and the whole bu…

Value (ethics)Knowledge managementbusiness.industry05 social sciencesBusiness ecosystemKey featuresRegional developmentManagement of Technology and InnovationOn demand0502 economics and businessKey (cryptography)Position (finance)050211 marketingbusiness050203 business & managementEuropean Journal of Innovation Management
researchProduct

Privacy-preserving scheme for mobile ad hoc networks

2011

This paper proposes a decentralized trust establishment protocol for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the intersection of two sets. The first set represents a list of recommenders of the initiator and the second set is a list of trusted recommenders of the responder. The intersection of the sets represents a list of nodes that recommend the first node and their recommendations are trusted by the second node. In our experimental results we show that our scheme is effective even if there are 30 trusted nodes.

Vehicular ad hoc networkComputer scienceWireless ad hoc networkbusiness.industryMobile computingCryptographyMobile ad hoc networkEncryptionQA76Optimized Link State Routing ProtocolSecurity associationReputation systemComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Cryptography and SecurityComputer network2011 IEEE Symposium on Computers and Communications (ISCC)
researchProduct