Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
8739 open access dissertations and theses found for:
if(Anonymity)  »   Refine Search
1.
Improving anonymity networks via end-to-end design
by Viecco, Camilo Hernan, Ph.D.  Indiana University. 2011: 140 pages; 3509948.
3.
Uniform avoidance coupling, design of anonymity systems and matching theory
by Infeld, Ewa Joanna, Ph.D.  Dartmouth College. 2016: 119 pages; 10145489.
4.
Securing location privacy in vehicular applications and communications
by Corser, George P., Ph.D.  Oakland University. 2016: 165 pages; 10169186.
5.
6.
Location privacy in wireless sensor network using reciprocal protocol
by Mohan, Rakshitha, M.S.  California State University, Long Beach. 2016: 58 pages; 10118890.
7.
Anonymity and self-disclosure on MySpace
by Retelas, George, M.S.  San Jose State University. 2008: 38 pages; 1463394.
8.
deCODE: Genomics, anonymity, and informatic control
by Slammon, Robert M., Ph.D.  State University of New York at Buffalo. 2011: 173 pages; 3460799.
9.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
10.
Design and Implementation of Privacy-Preserving Surveillance
by Segal, Aaron, Ph.D.  Yale University. 2016: 162 pages; 10584958.
11.
An investigation of data privacy and utility using machine learning as a gauge
by Mivule, Kato, D.Sc.  Bowie State University. 2014: 262 pages; 3619387.
12.
Accounting for the social element in access-based consumption
by Koppenhafer, Leslie Erin, Ph.D.  University of Oregon. 2014: 193 pages; 3644441.
13.
14.
Boundaries and ethics for mental health practitioners in 12 step programs
by Milliken, Melissa A., Ed.D.  Argosy University/Sarasota. 2017: 113 pages; 10742447.
15.
16.
An ethnography of relevance in the digital age
by Bietila, David, M.A.  The George Washington University. 2010: 76 pages; 1480867.
17.
Bitcoin regulations and investigations: A proposal for U.S. policies
by Fawcett, Jay Palmer, M.S.  Utica College. 2017: 71 pages; 10244196.
18.
Block grant-funded educational programs: An untapped source of employees for the healthcare industry
by Gordon, Claudette Veronica, Ed.D.  University of Phoenix. 2009: 177 pages; 3405506.
19.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
20.
Randomization based privacy preserving categorical data analysis
by Guo, Ling, Ph.D.  The University of North Carolina at Charlotte. 2010: 127 pages; 3439261.
21.
22.
Client-centric Privacy Protection For Location-based Services
by Pingley, Aniket, D.Sc.  The George Washington University. 2011: 185 pages; 3469606.
23.
The Onion Name System: Tor-powered distributed DNS for tor hidden services
by Victors, Jesse, M.C.S.  Utah State University. 2015: 72 pages; 1598486.
24.
New approaches to cooperative game theory: Core and value
by Kamishiro, Yusuke, Ph.D.  Brown University. 2010: 108 pages; 3430135.
25.
How to protect children from Internet predators: A phenomenological study
by Alexander, Rodney T., D.M.  University of Phoenix. 2012: 209 pages; 3537797.
26.
Virtual morality: The moral status of virtual actions
by Wojak, Roland, M.A.  Colorado State University. 2012: 112 pages; 1532946.
27.
Social learning strategies: A qualitative study of self-regulated learning
by Brasser, Angela L., Ph.D.  Capella University. 2015: 119 pages; 3702736.
28.
A phenomenological inquiry into the leadership experiences of Troops to Teachers
by Broe, Steve, D.M.  University of Phoenix. 2008: 318 pages; 3339937.
29.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
1 - 30 of 8739 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest