288 resultados para public key replacement
Resumo:
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.
A Process Modelling Success Model: Case Study Insights from an Australian Public Sector Organisation
Resumo:
For decades, marketing and marketing research have been based on a concept of consumer behaviour that is deeply embedded in a linear notion of marketing activities. With increasing regularity, key organising frameworks for marketing and marketing activities are being challenged by academics and practitioners alike. In turn, this has led to the search for new approaches and tools that will help marketers understand the interaction among attitudes, emotions and product/brand choice. More recently, the approach developed by Harvard Professor, Gerald Zaltman, referred to as the Zaltman Metaphor Elicitation Technique (ZMET) has gained considerable interest. This paper seeks to demonstrate the effectiveness of this alternative qualitative method, using a non-conventional approach, thus providing a useful contribution to the qualitative research area.
Resumo:
This paper looks at employer expectations of advertising and public relations graduates seeking an entry level position. For employers in both disciplines, the top three priorities are the same generic skills – communications skills, personality traits and strategic or analytical thinking. However, some significant differences were observed, with PR practitioners assigning more importance to practical aspects such as experience in the field and internships. Public relations employers also tend to think that advertising graduates require less strategic skills than public relations graduates. Advertising practitioners generally considered the skills of entry level recruits to be more consistent across the two disciplines.
Resumo:
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently there is little understanding of how to best protect SCADA systems from malicious attacks. We review the constraints and requirements for SCADA security and propose a suitable architecture (SKMA) for secure SCADA communications. The architecture includes a proposed key management protocol (SKMP). We compare the architecture with a previous proposal from Sandia Labs.
Social Interests, The Public Good and Contemporary Individualised Discourses of Public Organisations