Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
29 open access dissertations and theses found for:
if(Kerberos)  »   Refine Search
1.
An Analysis of Remote Biometric Authentication with Windows
by Eyers, Brandy Marie, M.S.C.S.  University of South Florida. 2011: 42 pages; 1490509.
2.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
3.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
4.
IDnet Mesh: Towards user accountability for the Internet
by Deng, Leiwen, Ph.D.  Northwestern University. 2010: 134 pages; 3402413.
5.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
6.
Using Spammers' Computing Resources for Volunteer Computing
by Bui, Thai Le Quy, M.S.  Portland State University. 2014: 90 pages; 1553892.
7.
Faculty Perceptions Regarding Authentication of Online Students' Identities and Academic Dishonesty
by McMillan, Stephanie Renee, D.A.  George Mason University. 2012: 252 pages; 3518808.
8.
Information technology governance maturity and technology innovation in higher education: Factors in effectiveness
by Carraway, Deborah Louise, M.S.  The University of North Carolina at Greensboro. 2015: 113 pages; 1591474.
11.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
12.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
13.
Re-bounding sport psychology: Making a place for the gods in the games
by Molina, Evan, Ph.D.  Pacifica Graduate Institute. 2013: 177 pages; 3552567.
14.
Using content addressable techniques to optimize client -server systems
by Tolia, Niraj, Ph.D.  Carnegie Mellon University. 2007: 173 pages; 3286685.
15.
16.
Microsoft 365 and Exchange Server Hybrid Forensics
by Carlson, Alex, M.S.  Utica College. 2019: 71 pages; 27670117.
17.
Narratives on Narratives, From Utterance to Stories: Finding a Context for the Speaking Percussionist
by Whiting Smith, Bonnie Anne, D.M.A.  University of California, San Diego. 2012: 72 pages; 3523844.
18.
Securing multi-channel wireless networks against malicious behavior
by Zheng, Chaodong, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006123.
19.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
20.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
21.
Analysis and optimization for processing grid-scale XML datasets
by Head, Michael Reuben, Ph.D.  State University of New York at Binghamton. 2009: 121 pages; 3389637.
22.
Application Layer Authentication Using a Time-Based Password Effect upon the Smart Home Automation Controller
by Bringardner, Alan Scott, D.Sc.  Capitol Technology University. 2017: 227 pages; 27739945.
23.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
24.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
25.
Strange Belly-Fellows: The Impossible Projects of Salvation and Subjecthood in James Joyce's Ulysses
by Woldeyohannes, Elisabeth, M.A.  State University of New York at Buffalo. 2020: 319 pages; 27737521.
26.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
27.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
28.
A teacher's dashboard: Monitoring students in Tablet PC classroom settings
by Peiper, Chad E., Ph.D.  University of Illinois at Urbana-Champaign. 2008: 368 pages; 3347576.
29.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
1 - 29 of 29 displayed.
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest