Results 151 to 160 of about 1,939 (202)

Keyword Updatable PEKS

Lecture Notes in Computer Science, 2016
Secure keyword search in the asymmetric setting, also known as public-key encryption with keyword search PEKS, enables a receiver to search the encrypted messages with a keyword without revealing any information on the messages to the server in the store-and-forward system such as an e-mail system.
Dong Hoon Lee
exaly   +2 more sources

Personale Kundenorientierungsskala (PeKS)

2021
Die Kundenorientierung von Servicemitarbeiterinnen und -mitarbeitern gilt als zentral für die Kundenzu-friedenheit (Dormann et al., 2003; Dormann & Zapf, 2007). Kundenorientierung wird definiert als Be-reitschaft und Bemühung, Erwartungen und Anforderungen von Kunden zu verstehen und zu erfüllen (Dormann et al., 2003; Nerdinger, 2003).
openaire   +1 more source

Sequential Prolog machine PEK

New Generation Computing, 1986
The sequential Prolog machine PEK currently under development is described. PEK is an experimental machine designed for high speed execution of Prolog programs. The PEK machine is controlled by horizontal-type microinstructions. The machine includes bit slice microprocessor elements comprising a microprogram sequencer and ALU, and possesses hardware ...
Yukio Kaneda   +5 more
openaire   +1 more source

Nyctycia utilis Hacker & Peks 1993

Published as part of Joshi, Rahul, Raha, Angshuman, Bandyopadhyay, Uttaran, Bhattacharyya, Kamalika & Singh, Navneet, 2025, A catalogue of Noctuidae Latreille, 1809 (Lepidoptera: Noctuoidea) from India, pp.
Joshi, Rahul   +4 more
  +7 more sources

Political Efficacy Kurzskala (PEKS)

2014
Die PEKS ist ein ökonomisches Instrument zur Erfassung politischer Kompetenz- und Einflusserwartungen im politischen Bereich. Die Validierungsuntersuchungen haben gezeigt, dass die PEKS eine reliable und valide Messung der internen und externen politischen Kompetenz- und Einflusserwartungen erlaubt.
Beierlein, C.   +3 more
openaire   +1 more source

A flaw in the security proof of BDOP-PEKS and PEKS-STAT

Wuhan University Journal of Natural Sciences, 2007
Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security proof. In this paper, we find a flaw in the security proof of BDOP-PEKS and PEKS-STAT, present a new conclusion for the security of BDOP ...
Yajuan Zhang   +3 more
openaire   +1 more source

Pek en veren

TBV – Tijdschrift voor Bedrijfs- en Verzekeringsgeneeskunde, 2005
Ik was het al bijna weer vergeten, dat voorval van gisteravond. En ook die twee gebeurte­nissen van vorige week zou ik mij waarschijn­lijk nooit meer herinnerd hebben. Het gebeurt immers zo vaak, ik ben eraan gewend. En inmiddels is de innerlijke over­tuiging dat ik leuk werk heb en de juiste mens op de juiste plek ben, genoeg gegroeid om onwetende ...
openaire   +1 more source

Home - About - Disclaimer - Privacy