Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
25411 open access dissertations and theses found for:
if(Biometric security device)  »   Refine Search
3.
An Analysis of Remote Biometric Authentication with Windows
by Eyers, Brandy Marie, M.S.C.S.  University of South Florida. 2011: 42 pages; 1490509.
4.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
5.
Faculty Perceptions Regarding Authentication of Online Students' Identities and Academic Dishonesty
by McMillan, Stephanie Renee, D.A.  George Mason University. 2012: 252 pages; 3518808.
7.
Reliable SRAM Fingerprinting
by Kim, Joonsoo, Ph.D.  The University of Texas at Austin. 2011: 175 pages; 3572874.
13.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
14.
Liberating the biometric menagerie through score normalization improvements
by Paone, Jeffrey Richard, Ph.D.  University of Notre Dame. 2013: 192 pages; 3585263.
15.
Real-Time Adaptive Data-Driven Perception for Anomaly Priority Scoring at Scale
by Miraftabzadeh, Seyed Ali, Ph.D.  The University of Texas at San Antonio. 2017: 142 pages; 10686275.
17.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
18.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
19.
Multimodal biometrics – Representation, optimization and kernelization
by Avuthu, Poojita Reddy, M.S.  California State University, Long Beach. 2016: 44 pages; 10118895.
20.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
21.
Secure file transfers using mobile device
by Maddirala, Raghunath R., M.S.  California State University, Long Beach. 2010: 71 pages; 1481747.
22.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
24.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
25.
Strengthening System Security on the ARMv7 Processor Architecture with Hypervisor-Based Security Mechanisms
by Vetter, Julian, Ph.D.  Technische Universitaet Berlin (Germany). 2017: 115 pages; 27610268.
26.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
27.
A Modular Point-of-Care Platform for Real-Time Monitoring and Transmission of Physiological Signals
by Harder, René, Ph.D.  Vanderbilt University. 2015: 305 pages; 13835059.
28.
Analysis of facial marks as biometric signatures for forensic facial identification
by Srinivas, Nisha, Ph.D.  University of Notre Dame. 2015: 183 pages; 3731722.
30.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
1 - 30 of 25411 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest