Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1058 open access dissertations and theses found for:
if(Authentication)  »   Refine Search
1.
Towards usable end-user authentication
by Tanviruzzaman, Mohammad, Ph.D.  Marquette University. 2014: 138 pages; 3623762.
3.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
4.
5.
Digital Image Source Authentication
by Schippers, David A., D.Sc.  Capitol Technology University. 2018: 223 pages; 27828526.
6.
Application Layer Authentication Using a Time-Based Password Effect upon the Smart Home Automation Controller
by Bringardner, Alan Scott, D.Sc.  Capitol Technology University. 2017: 227 pages; 27739945.
7.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
8.
Efficient Public-Key Watermark Techniques for Authentication
by Jiang, Feng, Ph.D.  Purdue University. 2017: 124 pages; 10618833.
9.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
10.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
11.
An Analysis of Remote Biometric Authentication with Windows
by Eyers, Brandy Marie, M.S.C.S.  University of South Florida. 2011: 42 pages; 1490509.
12.
Autonomous vehicle two-factor authentication: Safety in keyless vehicle systems
by Tse, Gilbert, M.S.  California State University, Long Beach. 2016: 43 pages; 10105281.
13.
The TESLA-alpha broadcast authentication protocol for building automation system
by Suwannarath, Songluk, M.S.  California State University, Long Beach. 2016: 122 pages; 10111196.
14.
Faculty Perceptions Regarding Authentication of Online Students' Identities and Academic Dishonesty
by McMillan, Stephanie Renee, D.A.  George Mason University. 2012: 252 pages; 3518808.
15.
Hillbilly authentication: Investigating authentic regional identity in postmodern Appalachian culture
by Roberts, Mark Allen, Ph.D.  Union Institute and University. 2007: 315 pages; 3281256.
16.
18.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
20.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
21.
Secure building automation system using Tesla protocol
by Wadhwa, Preeti H., M.S.  California State University, Long Beach. 2015: 60 pages; 1601311.
22.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
23.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
24.
IDnet Mesh: Towards user accountability for the Internet
by Deng, Leiwen, Ph.D.  Northwestern University. 2010: 134 pages; 3402413.
25.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
26.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
27.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
28.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
29.
Building a Base for Cyber-autonomy
by Shoshitaishvili, Yan, Ph.D.  University of California, Santa Barbara. 2017: 178 pages; 10620012.
30.
Systems optimization for mobility management
by Dutta, Ashutosh, Ph.D.  Columbia University. 2010: 576 pages; 3428701.
1 - 30 of 1058 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest