Results 61 to 70 of about 9,006 (193)

تشخيص واقع التسويق الشعوري في شركات الاتصالات دراسة تحليلية لآراء عينة من زبائن شركة أسيا سيل في محافظة نينوى

open access: yesTikrit Journal of Administrative and Economic Sciences, 2022
يهدف البحث الحالي إلى تشخيص التسويق الشعوري ومدى استخدامه في الشركة المبحوثة، إذ يعتبر التسويق الشعوري من المفاهيم الحديثة للتسويق، ولضمان بقاء المنظمات في المنافسة والحفاظ على حصتها السوقية، وتحقيق أرباح عالية من خلال التوجه إلى التسويق الشعوري، وقياس ...
Meryam Aead Youssef   +1 more
doaj   +1 more source

A Knowledge-based Decision Support System for RP&M Process Selection [PDF]

open access: yes, 1999
Due to the large variety of RP&M material/machines and the. strengths/weaknesses associated with different RP&M processes, the decision·to select a suitableRP&M system becomes increasingly difficult.
Loh, H.T., Wong, Y.S., Xu, F.
core   +1 more source

Spartan Daily, February 26, 1947 [PDF]

open access: yes, 1947
Volume 35, Issue 91https://scholarworks.sjsu.edu/spartandaily/8967/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +3 more sources

CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion

open access: yesCryptography, 2018
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse ...
Jonathan Trostle
doaj   +1 more source

Everest: Towards a Verified, Drop-in Replacement of HTTPS [PDF]

open access: yes, 2017
The HTTPS ecosystem is the foundation on which Internet security is built. At the heart of this ecosystem is the Transport Layer Security (TLS) protocol, which in turn uses the X.509 public-key infrastructure and numerous cryptographic constructions and ...
Bhargavan, Karthikeyan   +21 more
core   +4 more sources

A novel distinguishing attack on Rocca

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
The study explores a novel attack originating from key commitment attacks that leverages the independence between ciphertext sequences, developing a distinguishing attack on Rocca. By utilizing a guess‐and‐determine approach, the attack reveals a vulnerability in Rocca, allowing the identification of another plaintext with comparable ciphertext ...
Nan Liu   +4 more
wiley   +1 more source

Detailed Assessment of Hardware Implementations, Attacks and Countermeasures for the Ascon Authenticated Cipher

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
ASCON has been selected by the National Institute of Standards and Technology (NIST) as the new authenticated cipher for lightweight environments. This paper analyses ASCON's hardware (HW) security through its HW implementation schemes, successful HW attacks and the proposed HW countermeasures against them, aiming to serve as a starting point for ...
Miguel Martín‐González   +3 more
wiley   +1 more source

Security of COFB against Chosen Ciphertext Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2022
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project.
Mustafa Khairallah
doaj   +1 more source

Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this paper, we study a group of AEAD schemes that use rekeying as a technique to increase efficiency by reducing the state size of the algorithm. We provide a unified model to study the behavior of the keys used in these schemes, called Rekey-and ...
Mustafa Khairallah
doaj   +1 more source

ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids

open access: yesIEEE Access, 2021
Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional power grids. In an SG system, the smart meter (SM) is the critical component that collects the power usage information related to users and delivers the ...
Muhammad Tanveer   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy