Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
347 open access dissertations and theses found for:
if(Cryptography)  »   Refine Search
1.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
2.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
3.
Securing mobile ad hoc networks
by Gudapati, Supriya, M.S.  California State University, Long Beach. 2015: 31 pages; 1604882.
4.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
5.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
7.
High Performance Cryptography for Electronic Product Code for Internet of Things Applications
by Shah, Niyati, M.S.  University of Louisiana at Lafayette. 2017: 67 pages; 10682396.
8.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
9.
Relativistic quantum cryptography
by Kaniewski, Jedrzej, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006026.
10.
Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography
by Ghosh, Debeshi D., M.S.  California State University, Long Beach. 2017: 39 pages; 10263604.
11.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
12.
RSA-based key compromised resistant protocol (KCR) for large databases
by Alharbi, Fatemah Mordhi, M.S.  California State University, Los Angeles. 2013: 59 pages; 1553319.
13.
Digital currency wallet for mobile devices
by Jose, Mamitha, M.S.  California State University, Long Beach. 2011: 102 pages; 1504486.
14.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
15.
GPU-Assisted Cryptography of Log-Structured Indices
by Kirby, Michael Warren, M.S.  University of Colorado at Boulder. 2012: 71 pages; 1511983.
16.
Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP)
by Byambajav, Dolgorsuren, M.S.  California State University, Long Beach. 2011: 76 pages; 1504435.
17.
Binary Edwards curves in elliptic curve cryptography
by Enos, Graham, Ph.D.  The University of North Carolina at Charlotte. 2013: 156 pages; 3563153.
18.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
19.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
20.
Secure file transfers using mobile device
by Maddirala, Raghunath R., M.S.  California State University, Long Beach. 2010: 71 pages; 1481747.
21.
On the randomness requirements for privacy
by Bosley, Carl, Ph.D.  New York University. 2010: 63 pages; 3428033.
22.
Modulo Multipliers with Adaptive Delay for a High Dynamic Range Residue Number System Using Booth Encoding
by Reddy, Ginni Sumanth, M.S.  California State University, Long Beach. 2017: 47 pages; 10263534.
23.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
25.
IDnet Mesh: Towards user accountability for the Internet
by Deng, Leiwen, Ph.D.  Northwestern University. 2010: 134 pages; 3402413.
26.
Algorithms in Elliptic Curve Cryptography
by Hutchinson, Aaron, Ph.D.  Florida Atlantic University. 2018: 148 pages; 10980188.
27.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
28.
A framework for secure mixnet-based electronic voting
by Popoveniuc, Stefan, Ph.D.  The George Washington University. 2009: 211 pages; 3344934.
29.
Factorization via the Chinese Remainder Theorem: Computational methods to enhance rapid key processing and decryption
by Hines, Steven T., M.S.C.S.  California State University, Long Beach. 2012: 82 pages; 1522231.
30.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
1 - 30 of 347 displayed.
  1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest