Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
454 open access dissertations and theses found for:
if(HUAC Hellman)  »   Refine Search
1.
Lillian Hellman's search for truth
by Jacobson, Melvin, M.A.  California State University, Dominguez Hills. 2015: 57 pages; 10020189.
2.
From the belly of the HUAC: The HUAC investigations of Hollywood, 1947–1952
by Meeks, Jack D., Ph.D.  University of Maryland, College Park. 2009: 353 pages; 3359408.
3.
The Impact of "Old-Wave" McCarthyism at Four Private Black Colleges and Universities in Atlanta, Georgia
by Williams, Patricia Coleman, Ed.D.  University of Pennsylvania. 2017: 195 pages; 10289390.
4.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
5.
From Italian American Icon to Working Class Hero: Perspectives on Pietro di Donato's "Christ in Concrete"
by Stefania, Silvia, M.A.  California State University, Long Beach. 2017: 84 pages; 10261046.
6.
Algorithms in Elliptic Curve Cryptography
by Hutchinson, Aaron, Ph.D.  Florida Atlantic University. 2018: 148 pages; 10980188.
8.
9.
Binary Edwards curves in elliptic curve cryptography
by Enos, Graham, Ph.D.  The University of North Carolina at Charlotte. 2013: 156 pages; 3563153.
10.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
13.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
14.
A Comparative Study of Lattice Based Algorithms for Post Quantum Computing
by Easttom, William Charles, II, D.B.A.  Capitol Technology University. 2018: 141 pages; 13901281.
15.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
16.
A David against Goliath: The American veterans committee's challenge to the American legion in the 1950s
by Hoefer, Peter D., Ph.D.  University of Maryland, College Park. 2010: 280 pages; 3426415.
17.
Design and Implementation of Privacy-Preserving Surveillance
by Segal, Aaron, Ph.D.  Yale University. 2016: 162 pages; 10584958.
18.
World War II and U.S. cinema: Race, nation, and remembrance in postwar film, 1945–1978
by Chester, Robert Keith, Ph.D.  University of Maryland, College Park. 2011: 700 pages; 3461504.
19.
Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications
by Haralambiev, Kristiyan, Ph.D.  New York University. 2011: 157 pages; 3466893.
20.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
21.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
22.
Grant Proposal for a Culturally Competent Program for Spanish Speaking Survivors of Intimate Partner Violence
by Hernandez, Ericka R., M.S.W.  California State University, Long Beach. 2019: 53 pages; 13813669.
23.
Bohemian Enterprises: Modernism, Creative Labor, and Cultural Production, 1913-1962
by Wilton, Jessica E., Ph.D.  Carnegie Mellon University. 2016: 332 pages; 10675117.
24.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
26.
Heroes of Hollywood's left tribe: Analysis of the memorials for Adrian Scott, John Howard Lawson, and Albert Maltz
by Rivett, Julie M., M.A.  California State University, Long Beach. 2013: 229 pages; 1522596.
27.
After school musical theatre enrichment program: A grant proposal
by McMullen, Rebecca L., M.S.W.  California State University, Long Beach. 2015: 46 pages; 1585520.
28.
Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor
by Ben Haj Frej, Mohamed, Ph.D.  University of Bridgeport. 2019: 110 pages; 27743650.
30.
An untold story: African American women founders of private and charter high schools
by Wilson, Sharon, Ed.D.  Pepperdine University. 2011: 148 pages; 3465586.
1 - 30 of 454 displayed.
  1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest