Showing 1 - 10 of 1,196
customers. This may not be sustainable for highly confidential data. Encryption, or more generally cryptography, may provide a …
Persistent link: https://www.econbiz.de/10010680764
Complex systems are of vast importance in the practical world as well as presenting many theoretical challenges. The measurement of system complexity is still imprecise. For many systems, their modular construction brings challenges in understanding how modules form and the emergent behavior...
Persistent link: https://www.econbiz.de/10005047409
This text was written as part of the project Modelling of Complex Systems for Public Policy. It reviews the classical authors who jointly contributed to establish the elements of what could constitute a “science of complexity”. Based on the original writings of these authors, the text...
Persistent link: https://www.econbiz.de/10011119976
relationship for a complex product. The main weakness lies in the use of multiple regression for the evaluation of the coefficients … results. The neuronal approach is globally more successful than PLS regression but neither of the two methods leads to an …
Persistent link: https://www.econbiz.de/10010708261
The security of Fridrich's algorithm against brute-force attack, statistical attack, known-plaintext attack and select-plaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to...
Persistent link: https://www.econbiz.de/10010589989
Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment,...
Persistent link: https://www.econbiz.de/10009435963
The problem of sharing manufacturing, inventory, or capacity to improve performance is applicable in many decentralized operational contexts. However, the solution of such problems commonly requires an intermediary or a broker to manage information security concerns of individual participants....
Persistent link: https://www.econbiz.de/10009218707
In der Arbeit soll die Wirtschaftlichkeit von Zertifizierungsstellen in Deutschland untersucht werden. Es erfolgt eine kurze Einführung in die technischen Grundlagen von Zertifizierungsstellen und Zertifikaten, die neben kryptographischen Verfahren der Verschlüsselung und Signatur die im...
Persistent link: https://www.econbiz.de/10008598621
We explore the consequences of the assumptions used in modern cryptographywhen applied to repeated games with public communication. Technically speaking, we model agents by polynomial Turing machinesand assume the existence of a trapdoor function. Under these conditions, we prove a Folk Theorem...
Persistent link: https://www.econbiz.de/10005043731
Persistent link: https://www.econbiz.de/10005616078