Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Kęstutis Lukšys"'
Dominance-Based Decision Rules for Pension Fund Selection under Different Distributional Assumptions
Publikováno v:
Mathematics, Vol 8, Iss 5, p 719 (2020)
The pension landscape is changing due to the market situation, and technological change has enabled financial innovations. Pension savers usually seek financial advice to make a personalised decision in selecting the right pension fund for them. As s
Externí odkaz:
https://doaj.org/article/9c6879e8acbb40b68300e1554a4af791
Autor:
Kristina Žukienė, Asta Daunorienė, Lina Šeduikytė, Ramunė Kasperė, Kęstutis Lukšys, Jūratė Maščinskienė, Gintaras Dervinis, Kęstutis Jankauskas, Valdas Grigaliūnas, Vitalija Gabrienė
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8cdecfa17bfcf5fc6368fe38a5649c85
https://doi.org/10.5755/e01.9786090217696
https://doi.org/10.5755/e01.9786090217696
Autor:
Valdas Grigaliūnas, Vitalija Gabrienė, Gintaras Dervinis, Asta Daunorienė, Kristina Žukienė, Kęstutis Jankauskas, Kęstutis Lukšys, Lina Šeduikytė, Jūratė Maščinskienė, Ramunė Kasperavičienė
Studentams dažnai kyla klausimų: kaip parengti ir apginti produkto vystymo projektą? Atsakymus galima rasti šioje knygoje, kurioje aptariama produkto vystymo eiga nuo idėjos iki maketo ar prototipo sukūrimo, ataskaitos sandara ir apimtis, gynim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6e7dc04a644bc53218d1d73d35ba261b
https://doi.org/10.5755/e01.9786090217085
https://doi.org/10.5755/e01.9786090217085
Autor:
Lina Šeduikytė, Jūratė Maščinskienė, Gintaras Dervinis, Valdas Grigaliūnas, Asta Daunorienė, Kęstutis Lukšys, Kristina Žukienė, Ramunė Kasperavičienė, Kęstutis Jankauskas
Besikeičiant mokymo(si) metodikoms dėstytojas tampa partneriu, gebančiu kartu mokytis su studentais, tačiau jam dažnai kyla vis naujų iššūkių ne tik organizuojant darbus ir užduotis, bet ir vertinant studentų atliktus darbus. Šioje eduka
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a394583ab2a78b537af67970d058955c
https://doi.org/10.5755/e01.9786090217115
https://doi.org/10.5755/e01.9786090217115
Autor:
Valdas Grigaliūnas, Lina Šeduikytė, Jūratė Maščinskienė, V. Baranauskas, Ramunė Kasperavičienė, Asta Daunorienė, Gintaras Dervinis, Kristina Žukienė, Kęstutis Jankauskas, Kęstutis Lukšys
Socialinių partnerių vaidmuo studijų procese yra reikšmingas tiek studentui, tiek Universitetui, tiek pačiam socialiniam partneriui. Ši knyga padės Universiteto socialiniams partneriams suprasti studijų modulio organizavimo etapus ir principu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::11403fd8108c582e66f26d49d7d229ed
https://doi.org/10.5755/e01.9786090217139
https://doi.org/10.5755/e01.9786090217139
Publikováno v:
Mathematics, Vol 10, Iss 15, p 2649 (2022)
In this paper, we present the construction of a sigma identification protocol based on matrix power function (MPF) defined over a certain non-commuting platform group. We use the previously defined templates for generating public parameters of our pr
Externí odkaz:
https://doaj.org/article/7d71e3f64cb344408c67f8dfe3456019
Publikováno v:
Mathematics, Vol 10, Iss 12, p 2123 (2022)
In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rat
Externí odkaz:
https://doaj.org/article/e7790cc066074c03b0d772994c1f6697
Publikováno v:
Symmetry, Vol 12, Iss 9, p 1389 (2020)
In this paper we present a cryptographic primitive based on non-commutative cryptography. This primitive is used for key exchange protocol (KEP) construction. We prove that the security of this primitive relies on a nondeterministic polynomial comple
Externí odkaz:
https://doaj.org/article/b1d5be6564eb4c98969c15c9d119521f
Publikováno v:
Symmetry, Vol 12, Iss 5, p 860 (2020)
A Shannon cipher can be used as a building block for the block cipher construction if it is considered as one data block cipher. It has been proved that a Shannon cipher based on a matrix power function (MPF) is perfectly secure. This property was ob
Externí odkaz:
https://doaj.org/article/d1c0c2ff780a43fe865460f904fbe9bf