![](images/graphics/blank.gif)
Authentic performance
-
Ebook Wireless network security: Part 1 includes contents: Chapter 1: High performance elliptic curve cryptographic co-processor; Chapter 2: An adaptive encryption protocol in mobile computing; Chapter 3: Pre-authentication and authentication models in ad hoc networks; Chapter 4: Promoting identity-based key management in wireless ad hoc networks; Chapter 5: A survey of attacks and countermeasures in mobile ad hoc networks; Chapter 6: Secure routing in wireless ad-hoc networks; Chapter 7: A survey on intrusion detection in mobile ad hoc networks.
186p
haojiubujain06
06-09-2023
17
4
Download
-
The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This scheme can perform security functions and authenticate the origin and integrity of the encrypted message simultaneously. Moreover, the proposed scheme is also used as the basis for developing an algorithm to establish a shared secret key for symmetric key cryptosystems.
10p
viengels
25-08-2023
6
4
Download
-
Ebook Performance management: Putting research into action – Part 2 includes contents: Chapter 9: managing contextual performance; chapter 10: using performance management as a learning tool; chapter 11: diagnosing, understanding, and dealing with counterproductive work behavior; chapter 12: forced rankings: pros, cons, and practices; chapter 13: technology and performance management; chapter 14: authentic performance; chapter 15: assessing performance management programs and policies; chapter 16: performance management of the future; chapter 17: best practices in performance management.
373p
haojiubujain03
24-07-2023
7
6
Download
-
The purpose of this study was to investigate the direct and indirect effects of leadership behaviours on organisational outcomes within the context of organisations from the private industry sector in Australia. Specifically, this study was interested in examining the influence of authentic leadership and ethical leadership on perceived ethical climate, subordinates’ organisational citizenship behaviours, affective organisational commitment, and in-role performance.
235p
runthenight04
02-02-2023
3
3
Download
-
The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message.
8p
visirius
19-01-2023
7
2
Download
-
Despite the widespread use of artichoke-based food supplements for obesity control (FSOC), studies on evaluation of the quality/authenticity of these commercial products are scarce. To that aim, a new multianalytical strategy, based on the use of gas chromatography coupled to mass spectrometry (GC–MS) and high performance liquid chromatography coupled to ultraviolet and mass spectrometry detection (HPLCUV-MS).
16p
viginny
23-12-2022
15
3
Download
-
A plethora of studies have been conducted to examine the relationship between EFL students’ use of strategies and reading comprehension. Findings from those studies agree on a consensus that reading strategies possess a significant relationship with reading performance. This study functions as an attempt to contribute to previous findings by examining how students develop their reading strategies acquired from thematic texts at high school level to university level with authentic texts.
4p
viellenkullman
16-05-2022
36
4
Download
-
In ordinary signature schemes, such as RSA, DSA, ECDSA, the signing process is performed only for a single message. Due to performance issues, in some contexts, the above solutions will become unsuitable if a party needs to sign multiple messages simultaneously. For example, in the authenticated key exchange protocols based on signatures between client and server, the server is expected to handle multiple key exchange requests from different clients simultaneously.
12p
vikissinger
03-03-2022
16
1
Download
-
The present work aimed to determine colorants used as food additives to confirm the gummy candy products authentication using a newly designed adsorbent in magnetic dispersive solid phase extraction. Nowadays, many kinds of synthetic dyes are widely added to food products and should be strictly monitored and regulated like other food additives.
7p
mudbound
10-12-2021
11
1
Download
-
This work consists of six phases which are registration, authentication, face detection, features extraction, image similarity, and image retrieval. The current study runs on a database of 810 images which was borrowed from face94 to measure the performance of image retrieval.
22p
spiritedaway36
28-11-2021
13
2
Download
-
Based on the above aim, the research involves two main objectives. First, it investigates the differences in the performances between the control group and the experimental group by the comparison of pretest and posttest‟s results.
85p
closefriend09
16-11-2021
12
3
Download
-
This paper study has been performed to evaluate the botanical, pharmacognostic, phytochemical and DNA features of H. formicarum collected from Phu Quoc Island which could serve as criteria of identification and authentication.
7p
nguyenmyhuyen90
04-03-2021
6
0
Download
-
The paper also describes a few implementations of ABE applied in the cryptography community and the challenges of integrating ABE into real-world applications. Finally, the paper proposes an implementation of ABE for Android mobile devices. This implementation associated with the Kerberos protocol can be applied to secured data sharing applications. The Kerberos protocol aims at providing mutual authentication for the client server model. Experiments have evaluated the proposed ABE implementation on Android mobile devices along with the Kerberos system.
11p
trinhthamhodang9
04-12-2020
18
1
Download
-
In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses the security of the method encrypting directly QAM symbols instead of input bit-stream.
8p
tamynhan6
14-09-2020
33
3
Download
-
This paper presents the evaluation of the proposed 4,180km Trans-Saharan Gas Pipeline (TSGP), which is part 2 of this paper. The main aim of this paper was to evaluate the pipeline outlet pressure since a fixed inlet pressure was given and to authenticate the correlation between the performance parameters of gas compressor and pipeline.
14p
cleopatrahuynh
01-06-2020
9
1
Download
-
The purpose of this study is to examine the role of change readiness in mediating the effects of ambidextrous organization and authentic followership on innovative performance. The result of this study indicate that authentic followership, ambidextrous organization and change readiness directly influenced on innovative performance.
8p
tozontozon
25-04-2020
8
1
Download
-
In January 2015 the Mekong Delta was listed by the international travel publication Rough Guides as one of the top six best value destinations in the world, because of the authenticity of its experience and the ease of interaction with local culture and daily life. The majority of tourist accommodation in the Delta is located in the three provinces of An Giang, Can Tho and Kien Giang according to VNAT statistics.
77p
khidoichuoi
29-02-2020
48
1
Download
-
This study provides some insights into the use of speech acts by Vietnamese EFL learners from a cross-cultural perspective. It is suggested that the influence of culture has resulted in students’ common failures to understand and perform English speech acts. To minimize this kind of pragmatic failure, it is recommended that EFL teachers raise students’ awareness of some cultural issues in cross-cultural communication. Furthermore, it is necessary to incorporate speech acts into English language teaching with authentic input and lifelike communicative activities.
7p
slimzslimz
08-12-2019
57
7
Download
-
This paper proposes a Hybrid Improved Bacterial Swarm (HIBS) optimization algorithm for the minimization of Equal Error Rate (EER) as a performance measure in a hand-based multimodal biometric authentication system. The hybridization of the algorithm was conducted by incorporating Bacterial Foraging Optimization (BFO) and Particle Swarm Optimization (PSO) algorithm to mitigate weaknesses in slow and premature convergence.
19p
meriday
20-04-2019
30
2
Download
-
Advanced Encryption Standard and message authentication code based message digest 6 (MAC-MD6) algorithms for secure transmission of data over the MANET with AODV routing protocol.This proposed model will provide better performance in terms of Throughput, packet delivery ratio (PDR) and minimizes routing overhead as well as effective bandwidth utilization.
6p
hongnhan878
12-04-2019
19
1
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)