Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
549 open access dissertations and theses found for:
if(McCarthyism Hellman)  »   Refine Search
1.
Lillian Hellman's search for truth
by Jacobson, Melvin, M.A.  California State University, Dominguez Hills. 2015: 57 pages; 10020189.
2.
The Impact of "Old-Wave" McCarthyism at Four Private Black Colleges and Universities in Atlanta, Georgia
by Williams, Patricia Coleman, Ed.D.  University of Pennsylvania. 2017: 195 pages; 10289390.
4.
Drastic choices and extreme consequences: Concerning Korea 1945-1953
by Kwon, J. Jihae, M.A.  Corcoran College of Art + Design. 2014: 40 pages; 1556120.
5.
Bourbon, pork chops, and red peppers: Political immorality in Florida, 1945–1968
by Weitz, Seth A., Ph.D.  The Florida State University. 2007: 267 pages; 3263791.
6.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
7.
Algorithms in Elliptic Curve Cryptography
by Hutchinson, Aaron, Ph.D.  Florida Atlantic University. 2018: 148 pages; 10980188.
9.
10.
Binary Edwards curves in elliptic curve cryptography
by Enos, Graham, Ph.D.  The University of North Carolina at Charlotte. 2013: 156 pages; 3563153.
11.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
13.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
14.
A Comparative Study of Lattice Based Algorithms for Post Quantum Computing
by Easttom, William Charles, II, D.B.A.  Capitol Technology University. 2018: 141 pages; 13901281.
15.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
16.
Design and Implementation of Privacy-Preserving Surveillance
by Segal, Aaron, Ph.D.  Yale University. 2016: 162 pages; 10584958.
17.
Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications
by Haralambiev, Kristiyan, Ph.D.  New York University. 2011: 157 pages; 3466893.
18.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
19.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
20.
Grant Proposal for a Culturally Competent Program for Spanish Speaking Survivors of Intimate Partner Violence
by Hernandez, Ericka R., M.S.W.  California State University, Long Beach. 2019: 53 pages; 13813669.
21.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
22.
A David against Goliath: The American veterans committee's challenge to the American legion in the 1950s
by Hoefer, Peter D., Ph.D.  University of Maryland, College Park. 2010: 280 pages; 3426415.
23.
Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor
by Ben Haj Frej, Mohamed, Ph.D.  University of Bridgeport. 2019: 110 pages; 27743650.
24.
From the belly of the HUAC: The HUAC investigations of Hollywood, 1947–1952
by Meeks, Jack D., Ph.D.  University of Maryland, College Park. 2009: 353 pages; 3359408.
26.
An untold story: African American women founders of private and charter high schools
by Wilson, Sharon, Ed.D.  Pepperdine University. 2011: 148 pages; 3465586.
27.
Disillusioned radicals: The intellectual odyssey of Todd Gitlin, Ronald Radosh and David Horowitz
by Roberts, Jason Daniel, Ph.D.  The George Washington University. 2007: 311 pages; 3258463.
28.
30.
1 - 30 of 549 displayed.
  1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest