Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
46931 open access dissertations and theses found for:
if(Information hiding)  »   Refine Search
1.
A reversible data hiding technique in encrypted images by creating space before encryption
by Pakala, Vinay Kumar Reddy, M.S.  California State University, Long Beach. 2016: 37 pages; 10141524.
2.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
3.
Image encryption with reversible data hiding by using least significant bits transformation
by Yallanuru, Bhaskar, M.S.  California State University, Long Beach. 2016: 35 pages; 1606099.
4.
5.
A complex data hiding algorithm for secure image transmission and covert communication
by Kancham, Sudheer Reddy, M.S.  California State University, Long Beach. 2016: 30 pages; 1606065.
6.
The Development of Preservice English Teacher Beliefs about Literacy, Teaching, and Students
by Simon, Kelly R., Ph.D.  University of California, Santa Barbara. 2012: 300 pages; 3545132.
7.
Refining syntactic sugar: Tools for supporting macro development
by Culpepper, Ryan, Ph.D.  Northeastern University. 2010: 134 pages; 3398747.
11.
Trauma of Holocaust survivors: Expression and avoidance in coping and recovery
by McClatchey, Emily S. Jacobs, Ph.D.  New York University. 2011: 241 pages; 3439456.
12.
Parameterizable Process Views in Imperative Process Models
by Fichtner, Myriel, M.Sc.  Universitaet Bayreuth (Germany). 2019: 77 pages; 27600403.
13.
Automated Detection of Semagram-Laden Images
by Cerkez, Paul S., Ph.D.  Nova Southeastern University. 2012: 238 pages; 3505651.
14.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
17.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
18.
Detection of malware via side channel information
by Quinn, Rian, Ph.D.  State University of New York at Binghamton. 2012: 169 pages; 3522519.
19.
Imperfect stegosystems—Asymptotic laws and near-optimal practical constructions
by Filler, Tomas, Ph.D.  State University of New York at Binghamton. 2011: 182 pages; 3465618.
20.
Hiding in Plain Sight: Exploring Middle School Teachers' Accounts of Creativity for Teaching
by Mull, John Charles, Ed.D.  University of Pennsylvania. 2019: 217 pages; 13859102.
21.
On the randomness requirements for privacy
by Bosley, Carl, Ph.D.  New York University. 2010: 63 pages; 3428033.
22.
A qualitative study of Holocaust survivors: Reflections after sixty years
by Holben, Rachel, M.S.W.  California State University, Long Beach. 2009: 64 pages; 1466107.
24.
Information, Disclosure, and Accountability
by Guraieb Duenas, Marlene, Ph.D.  New York University. 2017: 173 pages; 10618922.
25.
Rethinking information privacy for the web
by Tierney, Matthew Ryan, Ph.D.  New York University. 2013: 161 pages; 3602740.
26.
Subsystem contexts and policy information: Conditional effects on information in congressional hearings
by Jatkowski, Walter J., III, Ph.D.  The University of Oklahoma. 2012: 454 pages; 3547850.
28.
29.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
30.
Adaptive Grid Computing
by Zhang, Juemin, Ph.D.  Northeastern University. 2010: 178 pages; 3443847.
1 - 30 of 46931 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest