89,061 research outputs found

    Implementation notes on bdes(1)

    Get PDF
    This note describes the implementation of bdes, the file encryption program being distributed in the 4.4 release of the Berkeley Software Distribution. It implements all modes of the Data Encryption Standard program

    Internal report cluster 1: Urban freight innovations and solutions for sustainable deliveries (3/4)

    Get PDF
    Technical report about sustainable urban freight solutions, part 3 of

    Internal report cluster 1: Urban freight innovations and solutions for sustainable deliveries (1/4)

    Get PDF
    Technical report about sustainable urban freight solutions, part 1 of

    Continuous variable controlled quantum dialogue and secure multiparty quantum computation

    Full text link
    A continuous variable controlled quantum dialogue scheme is proposed. The scheme is further modified to obtain two other protocols of continuous variable secure multiparty computation. The first one of these protocols provides a solution of two party socialist millionaire problem, while the second protocol provides a solution for a special type of multi-party socialist millionaire problem which can be viewed as a protocol for multiparty quantum private comparison. It is shown that the proposed scheme of continuous variable controlled quantum dialogue can be performed using bipartite entanglement and can be reduced to obtain several other two and three party cryptographic schemes in the limiting cases. The security of the proposed scheme and its advantage over corresponding discrete variable counterpart are also discussed. Specifically, the ignorance of an eavesdropper in the proposed scheme is shown to be very high compared with corresponding discrete variable scheme and thus the present scheme is less prone to information leakage inherent with the discrete variable quantum dialogue based schemes.It is further established that the proposed scheme can be viewed as a continuous variable counterpart of quantum cryptographic switch which allows a supervisor to control the information transferred between the two legitimate parties to a continuously varying degree.Comment: Quantum dialogue and its application in the continuous variable scenario is studied in detai

    LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

    Full text link
    The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile environments. The traditional public key cryptography involves huge computational costs and is not so suitable for the resource-constrained platforms. The elliptic curve-based approaches as the newer solutions require certain considerations that are not taken into account in the traditional public key infrastructures. The main contribution of this paper is to introduce a Lightweight Public Key Infrastructure (LPKI) for the constrained platforms such as mobile phones. It takes advantages of elliptic curve cryptography and signcryption to decrease the computational costs and communication overheads, and adapting to the constraints. All the computational costs of required validations can be eliminated from end-entities by introduction of a validation authority to the introduced infrastructure and delegating validations to such a component. LPKI is so suitable for mobile environments and for applications such as mobile commerce where the security is the great concern.Comment: 6 Pages, 6 Figure

    Internationalization strategies of frontier Lusophone-African multinational enterprises: comparative case studies of Angola and Mozambique

    Full text link
    Internationalization theories suggest that enterprises from emerging and frontier markets will adopt different entry modes than those in advanced economies. There are very few studies to date, however, examining the process of how multi-national enterprises (MNEs) from frontier markets internationalize or evaluating which factors influence their mode of entry into global markets. This research investigates the internationalization strategies of Lusophone Africa MNEs from Angola and Mozambique, more specifically their entry mode, to expand the framework for entry mode strategies to include the motivations and issues of MNEs from emerging and frontier economies. Surveys, as well as in-depth, in-country, qualitative interviews reveal that these frontier and emerging market MNEs opted for equity-based investment strategies as their preferred mode of entry. A significant group second group opted for e-commerce/e-business strategies, and direct and indirect exports. Finally, a smaller portion of the interviewees chose Greenfield investment as a mode of entry. Many of these MNEs could be classified as born global/INV.https://doi.org/10.1080/15475778.2017.1335127Accepted manuscriptPublished versio

    An Architecture for Information Commerce Systems

    Get PDF
    The increasing use of the Internet in business and commerce has created a number of new business opportunities and the need for supporting models and platforms. One of these opportunities is information commerce (i-commerce), a special case of ecommerce focused on the purchase and sale of information as a commodity. In this paper we present an architecture for i-commerce systems using OPELIX (Open Personalized Electronic Information Commerce System) [11] as an example. OPELIX provides an open information commerce platform that enables enterprises to produce, sell, deliver, and manage information products and related services over the Internet. We focus on the notion of information marketplace, a virtual location that enables i-commerce, describe the business and domain model for an information marketplace, and discuss the role of intermediaries in this environment. The domain model is used as the basis for the software architecture of the OPELIX system. We discuss the characteristics of the OPELIX architecture and compare our approach to related work in the field
    corecore