Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
6432 open access dissertations and theses found for:
if(Password)  »   Refine Search
1.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
2.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
3.
The effectiveness of password restrictions and mnemonics on memory of older adults
by Hills, Martina Marie, M.S.  California State University, Long Beach. 2012: 99 pages; 1522230.
4.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
5.
Towards usable end-user authentication
by Tanviruzzaman, Mohammad, Ph.D.  Marquette University. 2014: 138 pages; 3623762.
6.
Use of image-based mnemonic techniques to enhance the memorability of user-generated passwords
by Nelson, Deborah L., M.S.  California State University, Long Beach. 2009: 108 pages; 1466145.
7.
Reasons for non-compliance with mandatory information assurance policies by a trained population
by Shelton, D. Cragin, Dr.sc.  Capitol Technology University. 2014: 243 pages; 3692148.
8.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
9.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
10.
The Internet and business: Business operations for the 21st century
by Golan, John J., M.A.  State University of New York Empire State College. 2010: 74 pages; 1479821.
11.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
13.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
14.
Autonomous vehicle two-factor authentication: Safety in keyless vehicle systems
by Tse, Gilbert, M.S.  California State University, Long Beach. 2016: 43 pages; 10105281.
15.
Configuration management using Expect (TCL/TK)
by Vallamsetla, Karthik, M.S.  California State University, Long Beach. 2016: 120 pages; 1606701.
16.
Software Reverse Engineering education
by Cipresso, Teodoro, M.S.  San Jose State University. 2009: 112 pages; 1478574.
17.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
18.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
19.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
20.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
22.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
23.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
24.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
25.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
26.
An Analysis of Remote Biometric Authentication with Windows
by Eyers, Brandy Marie, M.S.C.S.  University of South Florida. 2011: 42 pages; 1490509.
27.
Towards Effective Third-Party Application Dialogs: Solutions for Improved Attention and Comprehension
by Javed, Yousra, Ph.D.  The University of North Carolina at Charlotte. 2017: 211 pages; 10618024.
29.
Traffic management between two locations across multiprotocol label switching backbone cloud with enhanced network security
by Rao, Ashish Rao Janardhan, M.S.  California State University, Long Beach. 2015: 86 pages; 1605182.
30.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
1 - 30 of 6432 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest