Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1025 open access dissertations and theses found for:
if(Encryption)  »   Refine Search
2.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
3.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
4.
GPU-Assisted Cryptography of Log-Structured Indices
by Kirby, Michael Warren, M.S.  University of Colorado at Boulder. 2012: 71 pages; 1511983.
5.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
6.
Secure file transfers using mobile device
by Maddirala, Raghunath R., M.S.  California State University, Long Beach. 2010: 71 pages; 1481747.
7.
Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography
by Ghosh, Debeshi D., M.S.  California State University, Long Beach. 2017: 39 pages; 10263604.
8.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
9.
On the randomness requirements for privacy
by Bosley, Carl, Ph.D.  New York University. 2010: 63 pages; 3428033.
10.
Anonymous routing for privacy-preserving distributed computing
by Xiaolu, Zhu, M.S.  National University of Singapore (Singapore). 2015: 62 pages; 10006135.
11.
Design and implementation of an efficient image by encryption-then-compression system
by Mamidi, Bhargava Reddy, M.S.  California State University, Long Beach. 2016: 29 pages; 10001573.
12.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
13.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
14.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
15.
Digital currency wallet for mobile devices
by Jose, Mamitha, M.S.  California State University, Long Beach. 2011: 102 pages; 1504486.
16.
HIPAA protected delivery across Internet
by Shirke, Parth P., M.S.  California State University, Long Beach. 2016: 88 pages; 10116152.
17.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
19.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
20.
RSA-based key compromised resistant protocol (KCR) for large databases
by Alharbi, Fatemah Mordhi, M.S.  California State University, Los Angeles. 2013: 59 pages; 1553319.
21.
A reversible data hiding technique in encrypted images by creating space before encryption
by Pakala, Vinay Kumar Reddy, M.S.  California State University, Long Beach. 2016: 37 pages; 10141524.
22.
Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications
by Haralambiev, Kristiyan, Ph.D.  New York University. 2011: 157 pages; 3466893.
23.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
25.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
26.
Server management system
by Pandey, Rinku Omkarnath, M.S.  California State University, Long Beach. 2015: 44 pages; 1604881.
27.
Efficient Public-Key Watermark Techniques for Authentication
by Jiang, Feng, Ph.D.  Purdue University. 2017: 124 pages; 10618833.
28.
Image encryption with reversible data hiding by using least significant bits transformation
by Yallanuru, Bhaskar, M.S.  California State University, Long Beach. 2016: 35 pages; 1606099.
29.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
1 - 30 of 1025 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest