Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "key" wg kryterium: Temat


Tytuł:
Energy-aware key management in mobile wireless sensor networks
Autorzy:
He, X.
Szalachowski, P.
Kotulski, Z.
Fotiou, N.
Marias, G. F.
Polyzos, G. C.
Meer de, H.
Powiązania:
https://bibliotekanauki.pl/articles/106190.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
wireless sensor networks
Diffie-Hellman key agreement
key management
Opis:
Wireless sensor networks have received wide attention recently across the indoor and outdoor applications. On the other hand, more and more application scenarios require sensor nodes to be mobile, which imposes new technological challenges for security. Key management is the core for secure data communications among the resource-constrained sensor nodes. In this paper, based on the Group Diffie-Hellman key agreement protocols and the energy level of each node in the network, we propose Energy Aware Group Diffie-Hellman key management protocol for mobile wireless sensor networks. The simulation results show that the proposed key management protocol provide significant improvement in maximizing the lifetime of networks.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 83-96
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Certificate-less digital signature technology for e-Governance solutions
Autorzy:
Dhir, Shuchi
Devi, Sumithra
Powiązania:
https://bibliotekanauki.pl/articles/305692.pdf
Data publikacji:
2019
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
digital signatures
identity-based architecture
biometrics
fingerprint minutiae
RSA
private key
public key
Opis:
In spite of the fact that digital signing is an essential requirement for implementation of e-governance solutions in any organization, its use in large scale Government ICT implementation is negligible in India. In order to understand the reasons for low-level acceptance of the technology, authors performed a detailed study of a famous e-governance initiative of India. The outcome of the study revealed that the reasons are related to the challenges concerning the use of cryptographic devices carrying private key and the complicated process of generation, maintenance and disposal of Digital Signature Certificates (DSC). The solution, for the challenges understood from the case study, required implementation of a certificateless technology where private keys should be generated as and when required rather than storing them on cryptographic devices. Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution. This paper presents the first realistic architecture to implement Identity Based Cryptography with biometrics using RSA algorithm. The solution presented in the paper is capable of providing a certificate-less digital signature technology to the users, where public and private keys are generated on-the-fly.
Źródło:
Computer Science; 2019, 20 (4); 431-452
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Unconditional security by the laws of classical physics
Autorzy:
Mingesz, R.
Kish, L. B.
Gingl, Z.
Granqvist, C.-G.
Wen, H.
Peper, F.
Eubanks, T.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/220876.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information theoretic security
unconditional security
secure key exchange
secure key distribution
quantum encryption
Opis:
There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop - i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol . for secure key distribution leads to information theoretic security levels superior to those of today's quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).
Źródło:
Metrology and Measurement Systems; 2013, 20, 1; 3-16
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Verilog-A Compact Semiconductor Device Modelling and Circuit Macromodelling with the QucsStudio-ADMS "Turn-Key" Modelling System
Autorzy:
Brinson, M. E.
Margraf, M.
Powiązania:
https://bibliotekanauki.pl/articles/398029.pdf
Data publikacji:
2012
Wydawca:
Politechnika Łódzka. Wydział Mikroelektroniki i Informatyki
Tematy:
QucsStudio
ADMS
Verilog-A
modelowanie turn-key
compact device modelling
turn-key component modeling
Opis:
The Verilog-A "Analogue Device Model Synthesizer" (ADMS) has in recent years become an established modelling tool for GNU General Public License circuit simulator development. Qucs and ngspice are two examples of open source circuit simulators that employ ADMS for compact semiconductor model construction. This paper presents a "turn- key" compact device modelling and circuit macromodelling system based on ADMS and implemented in the QucsStudio circuit design, simulation and manufacturing environment. A core feature of the new system is a modelling procedure which does not require users to manually patch, by hand, circuit simulator C++ code. At the start of QucsStudio simulation the software automatically detects any changes in Verilog-A model code, re-compiling and dynamically linking the modified code to the body of the QucsStudio cod e. The inherent flexibility of the "turn-key" system encourage s rapid experimentation with analogue and RF compact device models and circuit macromodels. In this paper QucsStudio "turn-key" modelling is illustrated by the design of a single stage RF amplifier circuit and the Harmonic Balance large signal AC simulation of a 50 Ω RF diode switch.
Źródło:
International Journal of Microelectronics and Computer Science; 2012, 3, 1; 32-40
2080-8755
2353-9607
Pojawia się w:
International Journal of Microelectronics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Entrepreneurship as the Key Competence of Early Education Teachers in the Context of Employers’ Expectations – Research Report
Autorzy:
Malinowska, Joanna
Kondracka-Szala, Marta
Powiązania:
https://bibliotekanauki.pl/articles/1997701.pdf
Data publikacji:
2017-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
key competences
entrepreneurship
entrepreneurial
teacher training
Opis:
The issue undertaken in this article concentrates on entrepreneurship as the key competence of the teachers of preschool and early school children in Poland. A hypothesis was made that developing this competence in the course of professional teacher training is the condition of effective children education. For this purpose, an online survey was conducted with a sample of 232 head teachers of schools and kindergartens (public and private ones). The presented results of the research tackle expectations of employers towards recruited teachers with regards to this competence. Accomplishment of the research project allowed for formulating recommendations for teacher training within the framework of education for entrepreneurship by indicating directions and areas of implementing necessary changes.
Źródło:
The New Educational Review; 2017, 49; 239-249
1732-6729
Pojawia się w:
The New Educational Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Educational priorities in a post pandemic world
Autorzy:
Kobylarek, Aleksander
Plavčan, Peter
Amini Golestani, Taher
Powiązania:
https://bibliotekanauki.pl/articles/1878435.pdf
Data publikacji:
2021-09-25
Wydawca:
Fundacja Pro Scientia Publica
Tematy:
education
key competences
educational priorities
school
Opis:
This article attempts to bring together the most important educational priorities which should be taken into consideration when planning education in a world recovering from a pandemic. Some of the priorities discussed here should have already been taken into account during the 20th century, whilst others are completely new and result from changes that have come about in the 21st century, such as increased arrogance, ignorance, authoritarianism, educational insecurity, contempt for nature, confusion and the promotion of the lies under the name of post-truth . The authors propose a holistic approach to the education process, focused on priorities. In turn, the definition of those priorities should result from the most important problems that affect humanity.
Źródło:
Journal of Education Culture and Society; 2021, 12, 2; 5-11
2081-1640
Pojawia się w:
Journal of Education Culture and Society
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the key exchange and multivariate encryption with nonlinear polynomial maps of stable degree
Autorzy:
Ustimenko, V.
Wroblewska, A.
Powiązania:
https://bibliotekanauki.pl/articles/106224.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
key exchange
polynomial mapping
stable degree
Opis:
We say that the sequence gn, n≥3, n→∞ of polynomial transformation bijective mapsof free module Kgn over commutative ring K is a sequence of stable degree if the order of gn is growing with n and the degree of each nonidentical polynomial map of kind gkn is an independent constant c. Transformation b = τgnkτ−1, where τ is the affine bijection, n is large and k is relatively small, can be used as a base of group theoretical Diffie-Hellman key exchange algorithm for the Cremona group C(Kn) of all regular automorphisms of Kn. The specific feature of this method is that the order of the base may be unknown for the adversary because of the complexity of its computation. The exchange can be implemented by tools of Computer Algebra (symbolic computations). The adversary can not use the degree of right handside in bx = d to evaluate unknown x in this form for the discrete logarithm problem. In the paper we introduce the explicit constructions of sequences of elements of stable degree for the cases c = 3 and c = n+2/4 for each commutative ring K containing at least 3 regular elements and discuss the implementation of related key exchange and multivariate map algorithms.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2013, 13, 1; 63-80
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Key competences formation and effective support of students mobility at technology faculties: modeling, design and assessment of flexible education concept
Autorzy:
Pavlásek, P.
Simonová, A.
Koniar, D.
Hargaš, Libor
Špánik, P.
Uriča, T.
Prandová, A.
Powiązania:
https://bibliotekanauki.pl/articles/376745.pdf
Data publikacji:
2018
Wydawca:
Politechnika Poznańska. Wydawnictwo Politechniki Poznańskiej
Tematy:
key competences
flexibility
mobility
higher education didactics
Opis:
The paper brings the results of the current national educational agency project research of effectiveness of the modular didactic cycle with new technologies, methods and forms in student-focused concept through the processing of experimental data of the electronics study program from the period of 2016-2017. Data were collected from contributions kept by the students groups during the preparation phase and also from reflective final phase of the research period. Also, the presented solution and results of the project are directed at the main component of the educational process – the content of education and its compatibility with the technological trends in the actual working environment. The results show that digitization of the learning content and flexibility of design of educational modules with multimedia components are dominant and indicate compatibility with the trends of flexible educational environment. In addition, the results of project illustrates that even the change can be difficult, success can be attained in the most heterogeneous diversification of university education and mobility of graduates of technical universities that will contribute to increase of educational efficiency and will encourage arrival of investments to innovative entrepreneur projects and, mainly, will help national firms to succeed at EU and world market by strengthening of the dominant subject which produces values – the technical field graduate with the key competences for the 21st century needs.
Źródło:
Poznan University of Technology Academic Journals. Electrical Engineering; 2018, 96; 297-306
1897-0737
Pojawia się w:
Poznan University of Technology Academic Journals. Electrical Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Value For Clients Resulting From Rail Transport Market Regulation In Poland
Autorzy:
Antonowicz, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/417376.pdf
Data publikacji:
2014-12-15
Wydawca:
Akademia Leona Koźmińskiego w Warszawie
Tematy:
market
market regulation
key facilities
value
network
Opis:
Purpose: The aim of this study was to elucidate the role of regulation as a tool to create values for both business entities and individual clients due to competition development in the Polish market of rail transport services. Methodology: This study was of a conceptual character. It was based on the analysis of the notion of the rail transport services regulation and the main regulation problems that have appeared in the rail transport regulation practice so far. The analysis of literary sources as well as practice enabled the author to highlight the circumstances when the regulation becomes a necessity and to discuss the conditions for its introduction. Findings: Reviewing the regulation on Polish railway transportation market, the author presents a fundamental conclusion - despite all the changes on the market, regulation does not produce assumed results perceived as an increase of transportation role in economy. According to author, major improvement of institutional and marketing efficiency of regulation entity is essential, as it is relevant for producing favorable results concerning the way the market operates, behavior of the market players as well as building customer value. Originality: Market regulation is a new phenomenon in Polish rail transport. The study discussed the notion of regulatory service. A value-for-clients model was also offered, i.e. the clients of regulatory activities in the course of the competition development in the rail transport services.
Źródło:
Management and Business Administration. Central Europe; 2014, 22, 4; 168-178
2084-3356
Pojawia się w:
Management and Business Administration. Central Europe
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Key Competences in Educating Teachers
Autorzy:
SZŐKÖL, István
Powiązania:
https://bibliotekanauki.pl/articles/457380.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Rzeszowski
Tematy:
key competences
education
teachers competences
information literacy
Opis:
The aim of this work is to show the importance of the expansion of teacher’s key competences, while also pointing out those other competences which are unavoidable in the pedagogical work. If one wants to meet the exigencies of time: vehement changes in science, technology, economy, the changing character of work, one has to learn during all his lifetime. To fulfil the personal and social interests, to improve the quality of one’s life: the life-long education of the individuals is very important – from maternal schools, through scholastic education, education in different institutions and in business, until the education as pensioners.
Źródło:
Edukacja-Technika-Informatyka; 2015, 6, 1; 249-253
2080-9069
Pojawia się w:
Edukacja-Technika-Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Defining key economic competences for lifelong learning
Autorzy:
Czarnecki, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/2049778.pdf
Data publikacji:
2021
Wydawca:
Instytut Studiów Międzynarodowych i Edukacji Humanum
Tematy:
economics
key competences
lifelong learning
literacy
knowledge
Opis:
In this short article, the idea of key economic competences for lifelong learning is presented. Europe- an Commission recommendations on key competences for lifelong learning and related documents were used as primary sources of the theoretical analysis. The article is divided into an introduction and theoretical background, methodology, results and conclusion. Eight key economic competences defined in this article can be considered as a main contribution to the topic.
Źródło:
Humanum. Międzynarodowe Studia Społeczno-Humanistyczne; 2021, 1(40); 89-92
1898-8431
Pojawia się w:
Humanum. Międzynarodowe Studia Społeczno-Humanistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves
Autorzy:
Jebrane, A.
Toumanari, A.
Meddah, N.
Bousseta, M.
Powiązania:
https://bibliotekanauki.pl/articles/958109.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
authentication
key agreement
session initiation protocol
VoIP
Opis:
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone networks. However, the voice packets delivered over the Internet are not protected. The session initiation protocol (SIP) is widely used signaling protocol that controls communications on the Internet, typically using hypertext transport protocol (HTTP) digest authentication, which is vulnerable to many forms of attacks. This paper proposes a new secure authentication and key agreement scheme based on Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) named (ECDSA). Security analysis demonstrates that the proposed scheme can resist various attacks and it can be applied to authenticate the users with different SIP domains.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 2; 62-68
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Multivariate Cryptosystems Based on Computable Maps with Invertible Decomposition
Autorzy:
Ustimenko, V.
Powiązania:
https://bibliotekanauki.pl/articles/106324.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
multivariate map
invertible decomposition
public key infrastructure
Opis:
Let K be a commutative ring and K^n be a space over K of dimension n. We introduce the concept of a family of multivariate maps f(n) of K^n into itself with invertible decomposition.If f(n) is computable in polynomial time then it can be used as the public rule and the invertible decomposition provides a private key in f(n) based public key infrastructure. Requirementsof polynomial ity of degree and density for f(n) allow to estimate the complexity of encryption procedurefor a public user. The concepts of a stable family and a family of increasing order are motivatedby the studies of discrete logarithm problem in the Cremona group. The statement on the existenceof families of multivariate maps of polynomial degree and polynomial density of increasing order with the invertible decomposition is proved. The proof is supported by explicite construction which canbe used as a new cryptosystem. The presented multivariate encryption maps are induced by special walks in the algebraically dened extremal graphs A(n;K) and D(n;K) of increasing girth.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2014, 14, 1; 7-17
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of key performance indicators of capital market-oriented entities in the Prime Standard since the introduction of DRS 20
Autorzy:
Blumenstein, Philipp
Schmidt, Robert C.
Hastenteufel, Jessica
Powiązania:
https://bibliotekanauki.pl/articles/2175388.pdf
Data publikacji:
2022
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
DRS 20
Prime Standard
key performance indicator
Opis:
This paper examines the performance indicators of 168 Prime Standard entities since the introduction of DRS 20, focusing on the core question of how the use of performance indicators has changed over time. For this purpose, we compare the published key performance indicators from various companies in different years to point out existing differences. Furthermore, we examine which KPIs are changed most often and how frequently businesses adjust their performance indicators. The companies examined are differentiated according to size and sector.
Źródło:
Managerial Economics; 2022, 23, 1; 7--26
1898-1143
Pojawia się w:
Managerial Economics
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies