Results 61 to 70 of about 9,006 (193)
يهدف البحث الحالي إلى تشخيص التسويق الشعوري ومدى استخدامه في الشركة المبحوثة، إذ يعتبر التسويق الشعوري من المفاهيم الحديثة للتسويق، ولضمان بقاء المنظمات في المنافسة والحفاظ على حصتها السوقية، وتحقيق أرباح عالية من خلال التوجه إلى التسويق الشعوري، وقياس ...
Meryam Aead Youssef +1 more
doaj +1 more source
A Knowledge-based Decision Support System for RP&M Process Selection [PDF]
Due to the large variety of RP&M material/machines and the. strengths/weaknesses associated with different RP&M processes, the decision·to select a suitableRP&M system becomes increasingly difficult.
Loh, H.T., Wong, Y.S., Xu, F.
core +1 more source
Spartan Daily, February 26, 1947 [PDF]
Volume 35, Issue 91https://scholarworks.sjsu.edu/spartandaily/8967/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core +3 more sources
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse ...
Jonathan Trostle
doaj +1 more source
Everest: Towards a Verified, Drop-in Replacement of HTTPS [PDF]
The HTTPS ecosystem is the foundation on which Internet security is built. At the heart of this ecosystem is the Transport Layer Security (TLS) protocol, which in turn uses the X.509 public-key infrastructure and numerous cryptographic constructions and ...
Bhargavan, Karthikeyan +21 more
core +4 more sources
A novel distinguishing attack on Rocca
The study explores a novel attack originating from key commitment attacks that leverages the independence between ciphertext sequences, developing a distinguishing attack on Rocca. By utilizing a guess‐and‐determine approach, the attack reveals a vulnerability in Rocca, allowing the identification of another plaintext with comparable ciphertext ...
Nan Liu +4 more
wiley +1 more source
ASCON has been selected by the National Institute of Standards and Technology (NIST) as the new authenticated cipher for lightweight environments. This paper analyses ASCON's hardware (HW) security through its HW implementation schemes, successful HW attacks and the proposed HW countermeasures against them, aiming to serve as a starting point for ...
Miguel Martín‐González +3 more
wiley +1 more source
Security of COFB against Chosen Ciphertext Attacks
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project.
Mustafa Khairallah
doaj +1 more source
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
In this paper, we study a group of AEAD schemes that use rekeying as a technique to increase efficiency by reducing the state size of the algorithm. We provide a unified model to study the behavior of the keys used in these schemes, called Rekey-and ...
Mustafa Khairallah
doaj +1 more source
ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids
Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power grids. In an SG system, the smart meter (SM) is the critical component that collects the power usage information related to users and delivers the ...
Muhammad Tanveer +5 more
doaj +1 more source

