Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
125 open access dissertations and theses found for:
if(Exponentiation)  »   Refine Search
1.
Fast modular exponentiation using residue domain representation: A hardware implementation and analysis
by Nguyen, Christopher Dinh, M.S.  University of Maryland, Baltimore County. 2013: 129 pages; 1551346.
3.
Private Packet Filtering Searching for Sensitive Indicators without Revealing the Indicators in Collaborative Environments
by Oehler, Michael John, Ph.D.  University of Maryland, Baltimore County. 2013: 207 pages; 3609975.
4.
Factorization via the Chinese Remainder Theorem: Computational methods to enhance rapid key processing and decryption
by Hines, Steven T., M.S.C.S.  California State University, Long Beach. 2012: 82 pages; 1522231.
7.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
8.
The stochastics of diagnostic and threat detection tests
by Gordon, Anna S., Ph.D.  The George Washington University. 2012: 143 pages; 3502847.
9.
Algorithms and hardware designs for decimal multiplication
by Erle, Mark A., Ph.D.  Lehigh University. 2009: 229 pages; 3344791.
10.
Relational programming in miniKanren: Techniques, applications, and implementations
by Byrd, William E., Ph.D.  Indiana University. 2009: 296 pages; 3380156.
11.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
12.
Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications
by Haralambiev, Kristiyan, Ph.D.  New York University. 2011: 157 pages; 3466893.
13.
Phase space analysis and classification of sonar echoes in shallow -water channels
by Okopal, Greg, Ph.D.  University of Pittsburgh. 2009: 109 pages; 3384975.
14.
Bioresonance and the Implicate in Musicking
by Hoefs, Jonathan C., D.M.A.  University of California, Santa Cruz. 2017: 624 pages; 10283632.
15.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
17.
Investigating Accuracy of the Reconfigurable Optical Computer (ROC) in Metatronics for Solving Partial Differential Equations
by Crandall, Joseph Warren, M.S.  The George Washington University. 2019: 82 pages; 13864207.
18.
Gadgets and Gaussians in Lattice-Based Cryptography
by Genise, Nicholas James, Ph.D.  University of California, San Diego. 2019: 113 pages; 13857523.
19.
Symmetries of wave equations of statistical optics
by Mitofsky, Andrea M., Ph.D.  University of Illinois at Urbana-Champaign. 2008: 166 pages; 3337877.
20.
On Calculating the Cardinality of the Value Set of a Polynomial (and some related problems)
by Hill, Joshua Erin, Ph.D.  University of California, Irvine. 2014: 107 pages; 3646731.
21.
Automobile searches: The gap between the theory and praxis of law
by Fallik, Seth Wyatt, M.S.  University of Missouri - Kansas City. 2010: 108 pages; 1482943.
22.
Gender, Children, and Employment: A Study of the Effects of Children on Job Satisfaction
by Guler, Asli, M.A.  The George Washington University. 2018: 44 pages; 10932094.
23.
Modulo Multipliers with Adaptive Delay for a High Dynamic Range Residue Number System Using Booth Encoding
by Reddy, Ginni Sumanth, M.S.  California State University, Long Beach. 2017: 47 pages; 10263534.
24.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
25.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
26.
Partial Solutions for the Firing Squad Synchronization Problem on Rings
by Ng, Weng Leong, Ph.D.  University of California, Irvine. 2011: 380 pages; 3477975.
27.
The Dynamics of Living Arrangements Among the Elderly
by Witvorapong, Nopphol, Ph.D.  The University of North Carolina at Chapel Hill. 2011: 174 pages; 3477661.
28.
Algorithms in Elliptic Curve Cryptography
by Hutchinson, Aaron, Ph.D.  Florida Atlantic University. 2018: 148 pages; 10980188.
29.
30.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
1 - 30 of 125 displayed.
  1    2    3    4    5   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest