Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17216 open access dissertations and theses found for:
if(Secret storage)  »   Refine Search
1.
Securing Secrets and Managing Trust in Modern Computing Applications
by Sayler, Andy, Ph.D.  University of Colorado at Boulder. 2016: 212 pages; 10108746.
2.
Information theoretic secret key generation: Structured codes and tree packing
by Nitinawarat, Sirin, Ph.D.  University of Maryland, College Park. 2010: 144 pages; 3443492.
3.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
5.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
6.
Wide-Area Software-Defined Storage
by Nelson, Jude Christopher, Ph.D.  Princeton University. 2018: 266 pages; 10824272.
7.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
8.
A complex data hiding algorithm for secure image transmission and covert communication
by Kancham, Sudheer Reddy, M.S.  California State University, Long Beach. 2016: 30 pages; 1606065.
9.
Energy efficient pre-fetching—Models to implementation
by Manzanares, Adam C., Ph.D.  Auburn University. 2010: 148 pages; 3416112.
13.
Identity-Based Encryption on resource constrained embedded system
by Tam, Tony, M.S.  California State University, Long Beach. 2014: 106 pages; 1569592.
14.
15.
Secure storage via information dispersal across network overlays
by Johnston, Reece G., M.S.  The University of Alabama in Huntsville. 2016: 78 pages; 10157562.
16.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
17.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
18.
High temperature latent heat thermal energy storage to augment solar thermal propulsion for microsatellites
by Gilpin, Matthew R., Ph.D.  University of Southern California. 2015: 174 pages; 10160163.
19.
Protecting Digital Evidence during Natural Disasters: Why It Is Important
by Dodrill, Charles A., M.S.  Utica College. 2018: 66 pages; 10788395.
21.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
22.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
24.
Configuring Traditional Multi-Dock, Unit-Load Warehouses
by Tutam, Mahmut, Ph.D.  University of Arkansas. 2018: 251 pages; 10839559.
26.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
27.
28.
Secure file transfers using mobile device
by Maddirala, Raghunath R., M.S.  California State University, Long Beach. 2010: 71 pages; 1481747.
30.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
1 - 30 of 17216 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest