Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2248 open access dissertations and theses found for:
if(Identity-based encryption)  »   Refine Search
1.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
3.
Identity-Based Appeals: Explaining Evolution in the Strategic Rhetoric of Social Movements
by Kuhn, Katherine, Ph.D.  The George Washington University. 2013: 330 pages; 3593107.
4.
Gadgets and Gaussians in Lattice-Based Cryptography
by Genise, Nicholas James, Ph.D.  University of California, San Diego. 2019: 113 pages; 13857523.
5.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
6.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
7.
End-to-end Encryption, Backdoors, and Privacy
by Endeley, Robert E., T.D.  Capitol Technology University. 2019: 142 pages; 22624057.
8.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
9.
Image encryption with reversible data hiding by using least significant bits transformation
by Yallanuru, Bhaskar, M.S.  California State University, Long Beach. 2016: 35 pages; 1606099.
10.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
11.
A reversible data hiding technique in encrypted images by creating space before encryption
by Pakala, Vinay Kumar Reddy, M.S.  California State University, Long Beach. 2016: 37 pages; 10141524.
12.
Design and implementation of an efficient image by encryption-then-compression system
by Mamidi, Bhargava Reddy, M.S.  California State University, Long Beach. 2016: 29 pages; 10001573.
14.
Trust: A Pathway to Overcome Tacit Knowledge Transfer Barriers
by Fuller, Lajuan Perronoski, Ph.D.  Trident University International. 2018: 107 pages; 10788944.
15.
Race, ethnicity, and exclusion in group identity
by Burnaford, Rochelle M., Ph.D.  University of South Florida. 2012: 88 pages; 3505716.
16.
Secure file transfers using mobile device
by Maddirala, Raghunath R., M.S.  California State University, Long Beach. 2010: 71 pages; 1481747.
17.
On the randomness requirements for privacy
by Bosley, Carl, Ph.D.  New York University. 2010: 63 pages; 3428033.
18.
RSA-based key compromised resistant protocol (KCR) for large databases
by Alharbi, Fatemah Mordhi, M.S.  California State University, Los Angeles. 2013: 59 pages; 1553319.
19.
Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications
by Haralambiev, Kristiyan, Ph.D.  New York University. 2011: 157 pages; 3466893.
20.
Protecting Privacy of Data in the Internet of Things with Policy Enforcement Fog Module
by Al-Hasnawi, Abduljaleel, Ph.D.  Western Michigan University. 2018: 130 pages; 13877008.
21.
22.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
23.
GPU-Assisted Cryptography of Log-Structured Indices
by Kirby, Michael Warren, M.S.  University of Colorado at Boulder. 2012: 71 pages; 1511983.
24.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
25.
Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography
by Ghosh, Debeshi D., M.S.  California State University, Long Beach. 2017: 39 pages; 10263604.
26.
Anonymous routing for privacy-preserving distributed computing
by Xiaolu, Zhu, M.S.  National University of Singapore (Singapore). 2015: 62 pages; 10006135.
27.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
28.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
29.
Linear Cryptanalysis of Reduced-round Simon-like Ciphers Using Super Rounds
by Almukhlifi, Reham S., Ph.D.  The George Washington University. 2020: 315 pages; 27834241.
1 - 30 of 2248 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest