Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
45589 open access dissertations and theses found for:
if(Advanced encryption standard)  »   Refine Search
1.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
3.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
4.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
5.
Gadgets and Gaussians in Lattice-Based Cryptography
by Genise, Nicholas James, Ph.D.  University of California, San Diego. 2019: 113 pages; 13857523.
9.
Advanced bit manipulation instructions: Architecture, implementation and applications
by Hilewitz, Yedidya, Ph.D.  Princeton University. 2008: 232 pages; 3332424.
11.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
12.
A reversible data hiding technique in encrypted images by creating space before encryption
by Pakala, Vinay Kumar Reddy, M.S.  California State University, Long Beach. 2016: 37 pages; 10141524.
15.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
16.
Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography
by Ghosh, Debeshi D., M.S.  California State University, Long Beach. 2017: 39 pages; 10263604.
17.
Mental skills training for a lower-advanced to advanced pianist
by Jordan-Miller, Rebekah, D.M.A.  The University of Oklahoma. 2010: 153 pages; 3403720.
18.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
19.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
22.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
23.
The impact of at -risk students enrolled in advanced placement courses on a high school culture
by Posthuma, David, Ed.D.  California State University, Fullerton. 2010: 185 pages; 3410552.
25.
End-to-end Encryption, Backdoors, and Privacy
by Endeley, Robert E., T.D.  Capitol Technology University. 2019: 142 pages; 22624057.
27.
Secure file transfers using mobile device
by Maddirala, Raghunath R., M.S.  California State University, Long Beach. 2010: 71 pages; 1481747.
28.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
29.
30.
Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications
by Haralambiev, Kristiyan, Ph.D.  New York University. 2011: 157 pages; 3466893.
1 - 30 of 45589 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest