Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1045 open access dissertations and theses found for:
if(Encryption)  »   Refine Search
31.
Server management system
by Pandey, Rinku Omkarnath, M.S.  California State University, Long Beach. 2015: 44 pages; 1604881.
32.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
33.
High Performance Cryptography for Electronic Product Code for Internet of Things Applications
by Shah, Niyati, M.S.  University of Louisiana at Lafayette. 2017: 67 pages; 10682396.
34.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
36.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
38.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
39.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
40.
Secure Semantic Search over Encrypted Big Data in the Cloud
by Woodworth, Jason W., M.S.  University of Louisiana at Lafayette. 2017: 71 pages; 10286646.
41.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
42.
Cross-Layer Design for Secure and Resilient Control of Cyber-Physical Systems in Smart Cities
by Xu, Zhiheng, Ph.D.  New York University Tandon School of Engineering. 2018: 225 pages; 10840627.
43.
Protecting Privacy of Data in the Internet of Things with Policy Enforcement Fog Module
by Al-Hasnawi, Abduljaleel, Ph.D.  Western Michigan University. 2018: 130 pages; 13877008.
44.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
45.
Securing Secrets and Managing Trust in Modern Computing Applications
by Sayler, Andy, Ph.D.  University of Colorado at Boulder. 2016: 212 pages; 10108746.
46.
Statistical analysis and information leakage attacks on encrypted network traffic
by Wright, Charles V., III, Ph.D.  The Johns Hopkins University. 2008: 210 pages; 3309817.
47.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
48.
Secure storage via information dispersal across network overlays
by Johnston, Reece G., M.S.  The University of Alabama in Huntsville. 2016: 78 pages; 10157562.
49.
50.
A Location-Aware Architecture Supporting Intelligent Real-Time Mobile Applications
by Barbeau, Sean J., Ph.D.  University of South Florida. 2012: 245 pages; 3518695.
51.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
52.
Improving anonymity networks via end-to-end design
by Viecco, Camilo Hernan, Ph.D.  Indiana University. 2011: 140 pages; 3509948.
54.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
55.
Securing mobile ad hoc networks
by Gudapati, Supriya, M.S.  California State University, Long Beach. 2015: 31 pages; 1604882.
56.
Secure Mobile Deployment of NFL Training Materials
by Corris, Alexander Grosholz, Ph.D.  Nova Southeastern University. 2014: 93 pages; 3642884.
58.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
59.
Solid State Disk forensics: Is there a path forward?
by Fulton, John William, M.S.  Utica College. 2014: 47 pages; 1555597.
60.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
31 - 60 of 1045 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest