Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
54 open access dissertations and theses found for:
if(Cryptanalysis)  »   Refine Search
31.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
32.
Gadgets and Gaussians in Lattice-Based Cryptography
by Genise, Nicholas James, Ph.D.  University of California, San Diego. 2019: 113 pages; 13857523.
33.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
34.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
35.
Gröbner basis algorithms
by Dellaca, Roger D., M.S.  California State University, Long Beach. 2009: 130 pages; 1466198.
36.
Dynamic Trace Analysis with Zero-Suppressed BDDs
by Price, Graham David, Ph.D.  University of Colorado at Boulder. 2011: 224 pages; 3468482.
37.
Binary Edwards curves in elliptic curve cryptography
by Enos, Graham, Ph.D.  The University of North Carolina at Charlotte. 2013: 156 pages; 3563153.
38.
Competitive Tests and Estimators for Properties of Distributions
by Das, Hirakendu, Ph.D.  University of California, San Diego. 2012: 125 pages; 3503113.
39.
Leveraging Arti cial Intelligence to Advance Problem-Solving with Quantum Annealers
by Ayanzadeh, Ramin, Ph.D.  University of Maryland, Baltimore County. 2020: 165 pages; 27960509.
40.
Towards usable end-user authentication
by Tanviruzzaman, Mohammad, Ph.D.  Marquette University. 2014: 138 pages; 3623762.
41.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
42.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
43.
Authoritative and Unbiased Geographic Services
by Adhikari, Naresh, Ph.D.  Mississippi State University. 2020: 184 pages; 27743848.
44.
Single defects in semiconductors for quantum information processing and sensing
by Christle, David James, Ph.D.  The University of Chicago. 2016: 167 pages; 10157979.
45.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
46.
Beneath the Attack Surface
by Mowery, Keaton, Ph.D.  University of California, San Diego. 2015: 200 pages; 3712726.
47.
Quantifying and improving wireless privacy
by McCoy, Damon Liwanu, Ph.D.  University of Colorado at Boulder. 2009: 206 pages; 3387545.
48.
White House computer adoption and information policy from 1969 – 1979
by Laprise, John Paul, Ph.D.  Northwestern University. 2009: 261 pages; 3386523.
49.
Efficient Data Collection with Heterogeneous Cooperating Objects for Environmental Monitoring
by Figura, Richard, Ph.D.  Universitaet Duisburg-Essen (Germany). 2020: 171 pages; 28073659.
50.
Game relations, metrics and refinements
by Raman, Vishwanath, Ph.D.  University of California, Santa Cruz. 2010: 294 pages; 3421295.
51.
Imperfect stegosystems—Asymptotic laws and near-optimal practical constructions
by Filler, Tomas, Ph.D.  State University of New York at Binghamton. 2011: 182 pages; 3465618.
52.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
53.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
54.
Reducing decoherence in dc SQUID phase qubits
by Przybysz, Anthony J., Ph.D.  University of Maryland, College Park. 2010: 415 pages; 3444300.
31 - 54 of 54 displayed.
« First < Previous |   1    2  
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest