نتایج جستجو برای: aldin asad abadi

تعداد نتایج: 1078  

2000
Michele Boreale Rocco De Nicola Rosario Pugliese

Recent approaches to the analysis of crypto-protocols build on concepts which are well-established in the eld of process algebras, such as labelled transition systems (lts) and observational semantics. We outline some recent work in this direction that stems from using cryptographic versions of the pi-calculus { most notably Abadi and Gordon's spi-calculus { as protocol description languages. W...

Journal: :İnsan & Toplum Dergisi (The Journal of Human & Society) 2012

Journal: :Jurnal Agristan 2022

ABSTRAKPenelitian ini bertujuan untuk mengalisis tingkat profitabilitas usaha ternak itik pada Kelompok Tani Ternak Itik Berkah Abadi. Penelitian dilaksanakan bulan November 2021 Abadi di Kelurahan Pesurungan Lor, Kecamatan Margadana, Kota Tegal. Pemilihan lokasi penelitian ditentukan secara sengaja atau purposive sampling. Metode yang digunakan adalah metode studi kasus Sampel keseluruhan popu...

Journal: :Jurnal Entrepreneur dan Entrepreneurship 2022

This study aims to determine the effect of work discipline, environment, andorganizational culture on job satisfaction and employee performance in logisticstransportation companies. uses a sampling technique that is saturated sample.The population used this were all employees PT. Surya Lintas Abadi, totaling56 people. research was conducted from May 2021 December 2021. researchmethod quantitati...

Journal: :Jesya 2023

PT. Tahta Sukses Abadi Medan, better known as the Brastagi Supermarket, former Tiara Hotel. Organizational commitment is still not optimal, indicated by presence of recapitulation data on employee attendance which low, lack desire to work well. An unsupportive physical environment such piling up files that are neatly organized, equipment and supportive because some have been damaged. Regarding ...

1990
Joan Feigenbaum

We present a simple protocol for two-player secure circuit evaluation. The protocol enables players C and D to cooperate in the computation of f(x) while D conceals her data x from C and C conceals his circuit for f from D. The protocol is based on the technique of hiding information from an oracle [Abadi, Feigenbaum, Kilian, J. Comput. System Sci. 39(1):21{50, August, 1989].

1993
Colin Boyd Wenbo Mao

In the past few years a lot of attention has been paid to the use of special logics to analyse cryptographic protocols, foremost among these being the logic of Burrows, Abadi and Needham (the BAN logic). These logics have been successful in nding weaknesses in various examples. In this paper limitations of the BAN logic are illustrated with two examples. Consideration of the attacks leads to a ...

Journal: :Jurnal Bahtera Inovasi 2022

Human resources have a major role in an organization or company. All aspects related to human the end also affect performance, especially relation employee this study authors focus on Employee Compensation and Performance. This aims determine empirically effect of compensation performance at Jaya Abadi Cooperative. uses population sample 30 employees as respondents. The data collection techniqu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید