Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
35161 open access dissertations and theses found for:
if(Secure base)  »   Refine Search
4.
Economic Base Changes in Counties Impacted by Military Base Closures
by Moore, Andrea D., M.S.  Northern Illinois University. 2017: 135 pages; 10265770.
5.
Secure building automation system using Tesla protocol
by Wadhwa, Preeti H., M.S.  California State University, Long Beach. 2015: 60 pages; 1601311.
6.
Why Do Highly Educated Successful Career Women Make the Postnatal Decision To Stay Home with their Infants?
by Peralta, Pamela Agudelo, Ed.D.  Argosy University/Hawai'i. 2012: 223 pages; 3583939.
8.
Database Music: A History, Technology, and Aesthetics of the Database in Music Composition
by Cámara Halac, Federico Nicolás, Ph.D.  New York University. 2019: 250 pages; 13811347.
9.
Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP)
by Byambajav, Dolgorsuren, M.S.  California State University, Long Beach. 2011: 76 pages; 1504435.
10.
Experiencing a secure attachment to God among Christians: A phenomenological inquiry
by Taylor, Kathleen, Ph.D.  Pacifica Graduate Institute. 2016: 154 pages; 10164665.
11.
Secure Distributed Inference
by Chen, Yuan, Ph.D.  Carnegie Mellon University. 2019: 169 pages; 13883829.
12.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
13.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
14.
The Archetype of Home and Secure Attachment to Self and Others: A Foundation for Individuation
by Bell, Whitney S., M.A.  Pacifica Graduate Institute. 2019: 57 pages; 13809210.
15.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
16.
Secure Mobile Deployment of NFL Training Materials
by Corris, Alexander Grosholz, Ph.D.  Nova Southeastern University. 2014: 93 pages; 3642884.
17.
Antikernel: A decentralized secure hardware-software operating system architecture
by Zonenberg, Andrew D., Ph.D.  Rensselaer Polytechnic Institute. 2015: 148 pages; 3705663.
20.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
21.
Secure framework for implementing distributed networked control systems with mobile observers using heterogeneous controllers
by Padilla-Franco, Javitt Higmar Nahitt, Ph.D.  New Mexico State University. 2017: 194 pages; 10759028.
22.
A framework for secure mixnet-based electronic voting
by Popoveniuc, Stefan, Ph.D.  The George Washington University. 2009: 211 pages; 3344934.
23.
24.
User-centric secure cross-site interaction framework for online social networking services
by Ko, Moo Nam, Ph.D.  The University of North Carolina at Charlotte. 2011: 121 pages; 3474321.
25.
Secure storage via information dispersal across network overlays
by Johnston, Reece G., M.S.  The University of Alabama in Huntsville. 2016: 78 pages; 10157562.
26.
Secure file transfers using mobile device
by Maddirala, Raghunath R., M.S.  California State University, Long Beach. 2010: 71 pages; 1481747.
27.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
28.
Secure system simulation - Internet of Things
by Verma, Yukti, M.S.  California State University, Long Beach. 2016: 48 pages; 10116148.
29.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
30.
Risk and resilience: Girls' experiences navigating space and relationships in a secure residential facility
by Simonsen, Amy E., Ed.D.  The George Washington University. 2010: 176 pages; 3397608.
1 - 30 of 35161 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest