Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
18000 open access dissertations and theses found for:
if(Protocol)  »   Refine Search
31.
Effects of Lactobacillus rhamnosus MRS6AN on Intestinal GPAT3 Pathway Involved in the Lipid Transport in Enterocytes
by Ipinmoroti, Ayodeji Oludare, M.S.  East Tennessee State University. 2017: 129 pages; 13830177.
32.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
33.
Design of a routing protocol for wireless sensor networks
by Thodupunuri, Akarsh, M.S.  California State University, Long Beach. 2016: 76 pages; 10134006.
34.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
35.
Design and Implementation of Privacy-Preserving Surveillance
by Segal, Aaron, Ph.D.  Yale University. 2016: 162 pages; 10584958.
36.
Efficient medium access protocols for wireless and RFID networks
by Jain, Shweta, Ph.D.  State University of New York at Stony Brook. 2007: 119 pages; 3334935.
37.
Relativistic quantum cryptography
by Kaniewski, Jedrzej, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006026.
38.
Game relations, metrics and refinements
by Raman, Vishwanath, Ph.D.  University of California, Santa Cruz. 2010: 294 pages; 3421295.
40.
Traffic management between two locations across multiprotocol label switching backbone cloud with enhanced network security
by Rao, Ashish Rao Janardhan, M.S.  California State University, Long Beach. 2015: 86 pages; 1605182.
41.
Secure building automation system using Tesla protocol
by Wadhwa, Preeti H., M.S.  California State University, Long Beach. 2015: 60 pages; 1601311.
42.
Culturally-Sensitive Diagnostic Interviewing Protocol for Somali Immigrants and Refugees
by Johnson, Dasherline Cox, Psy.D.  Saint Mary's University of Minnesota. 2015: 151 pages; 3739831.
43.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
44.
Real-time and embedded systems building blocks for cyber-physical systems
by Wang, Qixin, Ph.D.  University of Illinois at Urbana-Champaign. 2008: 90 pages; 3337977.
45.
A framework for resolving mismatches that may occur during system integration using COTS software
by Tanyi, Horatious Njie, D.Sc.  The George Washington University. 2010: 105 pages; 3397241.
46.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
48.
New cluster-based routing and multi-channel MAC protocols for vehicular ad hoc networks
by Poland, Matthew C., M.S.  California State University, Long Beach. 2010: 156 pages; 1481762.
49.
Wildfire-traversal of network address translation routers to provide end-to-end connectivity to firewalled hosts
by Casaburi, James D., M.S.  California State University, Long Beach. 2010: 78 pages; 1486538.
50.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
51.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
53.
Performance Enhancement Using Cross Layer Approaches in Wireless Ad Hoc Networks
by Khalid, Murad, Ph.D.  University of South Florida. 2011: 212 pages; 3445415.
54.
Performance evaluation of Optimised Link State Routing and Dynamic Source Routing
by Matavalam, Divya Reddy, M.S.  California State University, Long Beach. 2016: 92 pages; 10007413.
55.
RSA-based key compromised resistant protocol (KCR) for large databases
by Alharbi, Fatemah Mordhi, M.S.  California State University, Los Angeles. 2013: 59 pages; 1553319.
56.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
57.
Uncovering Cardiac Repoliarzation Mechanisms Through Global Optimization to Dynamic Electrophysiological Protocols
by Ortega, Francis Adriel, Ph.D.  Weill Medical College of Cornell University. 2019: 165 pages; 13879898.
58.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
59.
Smart memories: A reconfigurable memory system architecture
by Firoozshahian, Amin, Ph.D.  Stanford University. 2009: 196 pages; 3343953.
60.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
31 - 60 of 18000 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest