Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1045 open access dissertations and theses found for:
if(Encryption)  »   Refine Search
91.
The Onion Name System: Tor-powered distributed DNS for tor hidden services
by Victors, Jesse, M.C.S.  Utah State University. 2015: 72 pages; 1598486.
92.
Megaphone: Fault tolerant, scalable, and trustworthy peer-to-peer microblogging
by Perfitt, Timothy, M.S.  California State University, Long Beach. 2009: 71 pages; 1472354.
93.
94.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
95.
Software Reverse Engineering education
by Cipresso, Teodoro, M.S.  San Jose State University. 2009: 112 pages; 1478574.
96.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
97.
Detection of communication over DNSSEC covert channels
by Hands, Nicole M., M.S.  Purdue University. 2016: 82 pages; 10181541.
98.
Modulo Multipliers with Adaptive Delay for a High Dynamic Range Residue Number System Using Booth Encoding
by Reddy, Ginni Sumanth, M.S.  California State University, Long Beach. 2017: 47 pages; 10263534.
100.
101.
Beneath the Attack Surface
by Mowery, Keaton, Ph.D.  University of California, San Diego. 2015: 200 pages; 3712726.
102.
High Performance On-Demand Video Transcoding Using Cloud Services
by Li, Xiangbo, Ph.D.  University of Louisiana at Lafayette. 2016: 147 pages; 10245247.
103.
Location detection using RFID
by Parmar, Aniketh M., M.S.  California State University, Long Beach. 2009: 44 pages; 1472242.
104.
A complex data hiding algorithm for secure image transmission and covert communication
by Kancham, Sudheer Reddy, M.S.  California State University, Long Beach. 2016: 30 pages; 1606065.
105.
A Modular Point-of-Care Platform for Real-Time Monitoring and Transmission of Physiological Signals
by Harder, RenĂ©, Ph.D.  Vanderbilt University. 2015: 305 pages; 13835059.
106.
Correlating factors of the manager's decision to use Virtual Private Networks
by McEady, Erasmus W., Ph.D.  Capella University. 2009: 93 pages; 3366093.
107.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
108.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
109.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
110.
Electronic discovery
by Keck, Andrew G., M.S.  Utica College. 2016: 58 pages; 10101099.
111.
Understanding gender differences in teachers' level of insight as it relates to ADHD
by Barnett, Jeremiah, Ph.D.  Capella University. 2017: 66 pages; 10257509.
112.
The myth of "the bottom line" in war, home, food, healthcare, and relationships
by Conley, Paul A., Ph.D.  Pacifica Graduate Institute. 2014: 221 pages; 3681276.
113.
Detection of malware via side channel information
by Quinn, Rian, Ph.D.  State University of New York at Binghamton. 2012: 169 pages; 3522519.
114.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
115.
Factorization via the Chinese Remainder Theorem: Computational methods to enhance rapid key processing and decryption
by Hines, Steven T., M.S.C.S.  California State University, Long Beach. 2012: 82 pages; 1522231.
116.
Application hardware-software co-design for reconfigurable computing systems
by Saha, Proshanta, Ph.D.  The George Washington University. 2008: 151 pages; 3297468.
117.
Superior privacy protection using combinations of fingerprints for identification of individuals
by Patel, Parixit J., M.S.  California State University, Long Beach. 2016: 56 pages; 10195827.
118.
Listening Intently: Towards a Critical Media Theory of Ethical Listening
by Feldman, Jessica, Ph.D.  New York University. 2017: 333 pages; 10623952.
119.
Using cognitive radio as an intrusion detection for ZigBee networks
by Sarakbi, Lelass, M.S.  California State University, Long Beach. 2012: 84 pages; 1507781.
120.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
91 - 120 of 1045 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest