Essays about: "our secret"

Showing result 1 - 5 of 35 essays containing the words our secret.

  1. 1. Private Equity: The Secret Sauce for Pandemic-Proof Performance or Just Another Quarantine Regret? How PE-backed companies performed during COVID-19 pandemic compared to non-PE-backed companies

    University essay from Handelshögskolan i Stockholm/Institutionen för finansiell ekonomi

    Author : Anna Muizniece; Gabriela Lenerte; [2023]
    Keywords : Private equity; COVID-19 crisis; Capital investment; Financial crisis; Financial fragility;

    Abstract : This study utilizes a dataset comprising 99 private equity-backed firms and 317 non-private equity-backed firms in Sweden to investigate whether private equity-backed firms were more resilient during the COVID-19 pandemic compared to similar firms using difference-in-differences method. Our findings indicate that private equity-backed firms experienced a significant increase in investment, credit, and equity inflows, and exhibited better operational performance when compared to similar firms in the wake of the COVID-19 outbreak. READ MORE

  2. 2. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Augustin Bariant; [2023]
    Keywords : Bitslicing; Cryptography; Whitebox; Compilation; Boolean circuits.; Parallélisation au bit; Cryptographie; Boîte blanche; Compilation; Circuits booléens.; Bitslicing; Kryptografi; Vit låda; Kompilering; Booleska kretsar.;

    Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE

  3. 3. Secure log-management for an Apache Kafka-based data-streaming service

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Hjalmar Kull; Mirza Hujic; [2023]
    Keywords : Apache Kafka;

    Abstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE

  4. 4. Polar Codes for Biometric Identification Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yicheng Bao; [2022]
    Keywords : Biometrics; Polar codes; Identification systems; Convolutional neural networks; Autoencoder; Privacy preservation; Biometri; Polära koder; Identifieringssystem; Konvolutionella neurala nätverk; Autoencoder; Sekretessskydd;

    Abstract : Biometrics are widely used in identification systems, such as face, fingerprint, iris, etc. Polar code is the only code that can be strictly proved to achieve channel capacity, and it has been proved to be optimal for channel and source coding. READ MORE

  5. 5. The Continued Support of Patriarchal Ideologies in the Nancy Drew Series : A Comparative Study of Nancy Drew: The Scarlet Slipper Mystery & Nancy Drew Diaries: The Magician’s Secret

    University essay from Högskolan i Halmstad

    Author : Nathalie Green; [2022]
    Keywords : ;

    Abstract : The well-loved Nancy Drew from 1930 has continued to solve mysteries in 1974 and 2015, though the series can no longer claim to be unconventional. Even though Nancy was a revolutionary character in 1930, the thought of a mystery-solving female is not as controversial anymore. READ MORE