Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1045 open access dissertations and theses found for:
if(Encryption)  »   Refine Search
61.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
62.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
63.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
64.
Design and Implementation of Privacy-Preserving Surveillance
by Segal, Aaron, Ph.D.  Yale University. 2016: 162 pages; 10584958.
65.
A framework for secure mixnet-based electronic voting
by Popoveniuc, Stefan, Ph.D.  The George Washington University. 2009: 211 pages; 3344934.
66.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
67.
Rethinking information privacy for the web
by Tierney, Matthew Ryan, Ph.D.  New York University. 2013: 161 pages; 3602740.
68.
Connectivity Between Two Distant Sites with Automatic Failover to IPsec
by Singh, Mankaran, M.S.  California State University, Long Beach. 2017: 39 pages; 10262849.
69.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
70.
Quantifying and improving wireless privacy
by McCoy, Damon Liwanu, Ph.D.  University of Colorado at Boulder. 2009: 206 pages; 3387545.
71.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
72.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
74.
A Comparative Study of Lattice Based Algorithms for Post Quantum Computing
by Easttom, William Charles, II, D.B.A.  Capitol Technology University. 2018: 141 pages; 13901281.
75.
Traffic management between two locations across multiprotocol label switching backbone cloud with enhanced network security
by Rao, Ashish Rao Janardhan, M.S.  California State University, Long Beach. 2015: 86 pages; 1605182.
78.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
79.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
80.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
81.
deCODE: Genomics, anonymity, and informatic control
by Slammon, Robert M., Ph.D.  State University of New York at Buffalo. 2011: 173 pages; 3460799.
82.
Contemporary defenses against intellectual property theft
by Hale, D. J., M.A.  California State University, Long Beach. 2013: 83 pages; 1523085.
83.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
84.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
86.
The Onion Name System: Tor-powered distributed DNS for tor hidden services
by Victors, Jesse, M.C.S.  Utah State University. 2015: 72 pages; 1598486.
87.
Performance and security in VOIP
by Patel, Malkesh M., M.S.  California State University, Long Beach. 2016: 38 pages; 10141531.
88.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
89.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
61 - 90 of 1045 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest