Essays about: "our secret"
Showing result 1 - 5 of 35 essays containing the words our secret.
-
1. Private Equity: The Secret Sauce for Pandemic-Proof Performance or Just Another Quarantine Regret? How PE-backed companies performed during COVID-19 pandemic compared to non-PE-backed companies
University essay from Handelshögskolan i Stockholm/Institutionen för finansiell ekonomiAbstract : This study utilizes a dataset comprising 99 private equity-backed firms and 317 non-private equity-backed firms in Sweden to investigate whether private equity-backed firms were more resilient during the COVID-19 pandemic compared to similar firms using difference-in-differences method. Our findings indicate that private equity-backed firms experienced a significant increase in investment, credit, and equity inflows, and exhibited better operational performance when compared to similar firms in the wake of the COVID-19 outbreak. READ MORE
-
2. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE
-
3. Secure log-management for an Apache Kafka-based data-streaming service
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE
-
4. Polar Codes for Biometric Identification Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Biometrics are widely used in identification systems, such as face, fingerprint, iris, etc. Polar code is the only code that can be strictly proved to achieve channel capacity, and it has been proved to be optimal for channel and source coding. READ MORE
-
5. The Continued Support of Patriarchal Ideologies in the Nancy Drew Series : A Comparative Study of Nancy Drew: The Scarlet Slipper Mystery & Nancy Drew Diaries: The Magician’s Secret
University essay from Högskolan i HalmstadAbstract : The well-loved Nancy Drew from 1930 has continued to solve mysteries in 1974 and 2015, though the series can no longer claim to be unconventional. Even though Nancy was a revolutionary character in 1930, the thought of a mystery-solving female is not as controversial anymore. READ MORE