Results 241 to 250 of about 600,761 (285)
Some of the next articles are maybe not open access.
Square Hash with a Small Key Size
2003This paper shows an improvement of square hash function family proposed by Etzel et al. [5]. In the new variants, the size of keys is much shorter while the collision probability is slightly larger. Most of the main techniques used to optimize the original square hash functions work on our variants as well.
Swee-Huay Heng, Kaoru Kurosawa
openaire +1 more source
Connectivity in random graphs induced by a key predistribution scheme - small key pools
2010 44th Annual Conference on Information Sciences and Systems (CISS), 2010We consider the random graph induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. We report on recent results concerning a conjectured zero-one law for graph connectivity, and provide simple proofs for small key pools.
Osman Yagan, Armand M. Makowski
openaire +1 more source
Expanding Weak PRF with Small Key Size
2006We propose modes for weakly-secure block ciphers that take one block input to provide output of arbitrary length. Damgard and Nielsen proposed such a mode called the Pseudorandom Tree (PRT) mode, and demonstrated that PRT could be used to establish a communication channel that is secure against Chosen-Plaintext Attacks, if the underlying block cipher ...
Kazuhiko Minematsu, Yukiyasu Tsunoo
openaire +1 more source
Small business performance in Thailand: key success factors
Journal of Research in Marketing and Entrepreneurship, 2017PurposeThis paper investigates how affirmative leadership management styles, market orientation and marketing intelligence drive the performance of small business enterprises in Bangkok, Thailand.Design/methodology/approachSmall business performance is a formative measurement consisting of financial and marketing metrics.
Rujirutana Mandhachitara +1 more
openaire +1 more source
Self-keying Identification Mechanism for Small Devices
2011We present a strong authentication mechanism intended for embedded systems based on standard but weak processors, without support for cryptographic operations. So far the main effort was to provide methods based on relatively short keys and complex computations, we make advantage of availability of non-volatile memory of larger size and confine ...
Krzysztof Barczyński +3 more
openaire +1 more source
Identifying key Information Systems competencies in small firms
Total Quality Management & Business Excellence, 2008Rather than examine all types of organisational capability, this paper focuses on Information Systems (IS) competencies, which can be viewed as a pre-requisite for building some organisational capabilities. The paper adopts a resource-based view of firms, which is an approach that has proved very useful in the study of Information Systems as the theory
openaire +1 more source
Key determinants of small companies' pension scheme adoption
Journal of Small Business and Enterprise Development, 2006PurposeThe aim of this paper is to provide a better understanding of the motivating and hindering factors to setting up sponsored occupational pension schemes in small companies.Design/methodology/approachThe study is conducted in two stages: the first stage is a qualitative study consisting of eight focus groups and the second stage is a quantitative ...
openaire +1 more source
PARTNERSHIPS — A KEY TO GROWTH IN SMALL BUSINESS
Journal of Enterprising Culture, 1999The conventional image of the small business owner is that of a highly independent individual, taking risks and 'doing it tough' with limited assistance from others. However, research conducted in the United Kingdom and Australia with high performance small firms suggest that this is not so.
openaire +1 more source

