Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1045 open access dissertations and theses found for:
if(Encryption)  »   Refine Search
121.
S4h: A Peer-to-Peer Search Engine with Explicit Trust
by Cowan, Greg, M.S.  Rensselaer Polytechnic Institute. 2019: 49 pages; 13813168.
122.
In the Shadows: The Illicit Tobacco Trade and Cryptomarkets
by Barrera, Viviana, M.S.  California State University, Long Beach. 2018: 61 pages; 10977616.
123.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
124.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
125.
Using cognitive radio as an intrusion detection for ZigBee networks
by Sarakbi, Lelass, M.S.  California State University, Long Beach. 2012: 84 pages; 1507781.
126.
Security and privacy in location-based mobile ad-hoc networks
by El Defrawy, Karim, Ph.D.  University of California, Irvine. 2010: 174 pages; 3422236.
127.
Listening Intently: Towards a Critical Media Theory of Ethical Listening
by Feldman, Jessica, Ph.D.  New York University. 2017: 333 pages; 10623952.
128.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
130.
NodeBlaze: Using reprogrammable logic to advance sensor networking technology
by Gruenwald, Charles, M.S.  University of Colorado at Boulder. 2007: 57 pages; 1447677.
131.
132.
Binary Edwards curves in elliptic curve cryptography
by Enos, Graham, Ph.D.  The University of North Carolina at Charlotte. 2013: 156 pages; 3563153.
133.
Study of W32/NetSky.Q worm and malicious website detection using packed malware string search
by Dongre, Ankush, M.S.  California State University, Long Beach. 2011: 94 pages; 1504450.
135.
Autonomous vehicle two-factor authentication: Safety in keyless vehicle systems
by Tse, Gilbert, M.S.  California State University, Long Beach. 2016: 43 pages; 10105281.
136.
Secure building automation system using Tesla protocol
by Wadhwa, Preeti H., M.S.  California State University, Long Beach. 2015: 60 pages; 1601311.
137.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
138.
Implementation of a Reliable and Cost Effective Smart Home System
by Jain, Mithilesh, M.S.  California State University, Long Beach. 2017: 32 pages; 10262917.
139.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
140.
Wide-Area Software-Defined Storage
by Nelson, Jude Christopher, Ph.D.  Princeton University. 2018: 266 pages; 10824272.
143.
Private Packet Filtering Searching for Sensitive Indicators without Revealing the Indicators in Collaborative Environments
by Oehler, Michael John, Ph.D.  University of Maryland, Baltimore County. 2013: 207 pages; 3609975.
144.
Advanced bit manipulation instructions: Architecture, implementation and applications
by Hilewitz, Yedidya, Ph.D.  Princeton University. 2008: 232 pages; 3332424.
145.
Semantically Enhanced Traceability across Software and System-Related Natural Language Artifacts
by Guo, Jin L. C., Ph.D.  University of Notre Dame. 2017: 181 pages; 13836191.
148.
Human Rites: Deciphering Fictions of Legal and Literary Personhood, 1830-1860
by Barter, Faith Elizabeth, Ph.D.  Vanderbilt University. 2016: 213 pages; 13834937.
149.
Consumer Preference: A Study of Mobile Digital Wallet
by Oyewole, Anas Olateju, D.B.A.  Capitol Technology University. 2018: 175 pages; 22624060.
150.
Privacy on Online Social Networks
by Gao, Yunpeng, D.Engr.  The George Washington University. 2019: 67 pages; 22615441.
121 - 150 of 1045 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest