Results 51 to 60 of about 343 (81)

Pengambilan Keputusan, Sikap dan Hubungan antara Karakteristik dengan Sikap Konsumen Minuman Kopi Benefit Coffee Kota Bandar Lampung [PDF]

open access: yes
This consumer behavior research aims to determine decision making, attitudes and the relationship between characteristics and attitudes of coffee beverage consumers at Benefit Coffee (BC) using the survey method and involving 68 respondents.
Adawiyah, Rabiatul   +2 more
core   +1 more source

A Note on 5-bit Quadratic Permutations’ Classification [PDF]

open access: yes, 2017
Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze various cryptographic and implementation properties of symmetric-key algorithms.
Begül Bilgin   +2 more
core   +2 more sources

ANALYSIS OF MARKETING STRATEGY IN AN EFFORT TO ATTRACT CONSUMER BUYING INTEREST ON MSME PEYEK SARI MENIR GUNUNG KIDUL [PDF]

open access: yes, 2021
Marketing strategy has an important role for Micro, Small and Medium Enterprises (MSMEs). The important role of the right marketing strategy will be able to attract consumers to buy the products.
Bintari, Wulan Probo   +2 more
core   +1 more source

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices [PDF]

open access: yes, 2015
In authenticated encryption schemes, there are two techniques for handling long ciphertexts while working within the constraints of a low buffer size: Releasing unverified plaintext (RUP) or Producing intermediate tags (PIT).
Donghoon Chang   +2 more
core  

A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates [PDF]

open access: yes, 2018
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography because of its ability to provide integrity, confidentiality and authenticity at the same time. Due to the emergence of security at the edge of computing fabric,
Anupam Chattopadhyay   +4 more
core  

Under Pressure: Security of Caesar Candidates beyond their Guarantees [PDF]

open access: yes, 2017
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as its official goal to ``identify a portfolio of authenticated ciphers that offer advantages over AES-GCM and are suitable for widespread adoption.\u27\u27
Damian Vizár, Serge Vaudenay
core  

Reforgeability of Authenticated Encryption Schemes [PDF]

open access: yes, 2017
This work pursues the idea of multi-forgery attacks as introduced by Ferguson in 2002. We recoin reforgeability for the complexity of obtaining further forgeries once a first forgery has succeeded. First, we introduce a security notion for the integrity (
Christian Forler   +3 more
core  

On the division property of S-boxes [PDF]

open access: yes, 2016
In 2015, Todo introduced a property of multisets of a finite field called the division property. It is then used by Todo in an attack against the S7 S-box of the MISTY1 cipher. This paper provides a complete mathematical analysis of the division property.
Faruk Göloğlu   +2 more
core  

PENINGKATAN DONASI DENGAN STRATEGI PEMASARAN DIGITAL PEDULISEHAT.ID MENGGUNAKAN FRAMEWORK CRISP-DM [PDF]

open access: yes
Pedulisehat.id is forum that offers services in the form of online, real-time, and transparent fundraising to collecting various donations from the public to help patients with chronic diseases and need funds for the treatment process.
Basuki, Carola   +3 more
core   +2 more sources

SIKAP DAN KEPUASAN KONSUMEN DALAM MENGONSUMSI JAMU KUNYIT ASAM INSTAN SEBAGAI MINUMAN KESEHATAN DI KOTA BANDAR LAMPUNG [PDF]

open access: yes
The purposes of this study were to analyze the decision-making process and consumer attitudes, to observe consumption patterns and to measure the level of consumer satisfaction of Sido Muncul and Herbadrink instant sour turmeric herbs in Bandar Lampung ...
Afifah, Shofy Aulia   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy