Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1150 open access dissertations and theses found for:
if(Encryption)  »   Refine Search
2.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
3.
End-to-end Encryption, Backdoors, and Privacy
by Endeley, Robert E., T.D.  Capitol Technology University. 2019: 142 pages; 22624057.
4.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
5.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
6.
Image encryption with reversible data hiding by using least significant bits transformation
by Yallanuru, Bhaskar, M.S.  California State University, Long Beach. 2016: 35 pages; 1606099.
7.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
8.
A reversible data hiding technique in encrypted images by creating space before encryption
by Pakala, Vinay Kumar Reddy, M.S.  California State University, Long Beach. 2016: 37 pages; 10141524.
9.
Design and implementation of an efficient image by encryption-then-compression system
by Mamidi, Bhargava Reddy, M.S.  California State University, Long Beach. 2016: 29 pages; 10001573.
11.
Secure file transfers using mobile device
by Maddirala, Raghunath R., M.S.  California State University, Long Beach. 2010: 71 pages; 1481747.
12.
On the randomness requirements for privacy
by Bosley, Carl, Ph.D.  New York University. 2010: 63 pages; 3428033.
13.
Gadgets and Gaussians in Lattice-Based Cryptography
by Genise, Nicholas James, Ph.D.  University of California, San Diego. 2019: 113 pages; 13857523.
14.
RSA-based key compromised resistant protocol (KCR) for large databases
by Alharbi, Fatemah Mordhi, M.S.  California State University, Los Angeles. 2013: 59 pages; 1553319.
15.
GPU-Assisted Cryptography of Log-Structured Indices
by Kirby, Michael Warren, M.S.  University of Colorado at Boulder. 2012: 71 pages; 1511983.
16.
Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography
by Ghosh, Debeshi D., M.S.  California State University, Long Beach. 2017: 39 pages; 10263604.
17.
Anonymous routing for privacy-preserving distributed computing
by Xiaolu, Zhu, M.S.  National University of Singapore (Singapore). 2015: 62 pages; 10006135.
18.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
19.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
20.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
21.
Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications
by Haralambiev, Kristiyan, Ph.D.  New York University. 2011: 157 pages; 3466893.
22.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
23.
Linear Cryptanalysis of Reduced-round Simon-like Ciphers Using Super Rounds
by Almukhlifi, Reham S., Ph.D.  The George Washington University. 2020: 315 pages; 27834241.
25.
Digital currency wallet for mobile devices
by Jose, Mamitha, M.S.  California State University, Long Beach. 2011: 102 pages; 1504486.
26.
HIPAA protected delivery across Internet
by Shirke, Parth P., M.S.  California State University, Long Beach. 2016: 88 pages; 10116152.
27.
Apollo: End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
by Wu, Hua, Ph.D.  The George Washington University. 2020: 248 pages; 27666292.
28.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
29.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
30.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
1 - 30 of 1150 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest