Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17367 open access dissertations and theses found for:
if(Security)  »   Refine Search
271.
The Integration of China's Dual-track Social Security System and Its Impact
by Lingxiao, Luo, M.S.  National University of Singapore (Singapore). 2015: 44 pages; 10006057.
272.
Design Automation for Carbon Nanotube Circuits Considering Performance and Security Optimization
by Liu, Lin, Ph.D.  Michigan Technological University. 2017: 169 pages; 10267186.
274.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
276.
Technology transfer and U.S. national security policy: The Joint Strike Fighter
by Krueger, Richard D., Ph.D.  George Mason University. 2010: 360 pages; 3421719.
277.
China Study: Emerging Challenges in Social Security, Health Care, and Leadership: Volume I
by Huff, Patrick D., Ed.D.  Pepperdine University. 2019: 415 pages; 13807532.
278.
The Implications of the Internet's Topological Structure for Its Efficiency, Security, and Reliability
by Nur, Abdullah Yasin, Ph.D.  University of Louisiana at Lafayette. 2018: 170 pages; 10980025.
279.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
280.
Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications
by Azhar, Mahmood Javed, Ph.D.  University of South Florida. 2018: 100 pages; 10980455.
281.
Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP)
by Byambajav, Dolgorsuren, M.S.  California State University, Long Beach. 2011: 76 pages; 1504435.
282.
We know who you are! Connecting education, identity, and national security
by Torres, Eric D., Ph.D.  The University of North Carolina at Greensboro. 2010: 154 pages; 3403776.
283.
China Study: Emerging Challenges in Social Security, Health Care, and Leadership: Volume II
by Huff, Patrick D., Ed.D.  Pepperdine University. 2019: 443 pages; 13812642.
284.
Myanmar's Rohingya Refugees The Search for Human Security
by Crossman, Linda, M.A.  Georgetown University. 2014: 127 pages; 1568320.
285.
Energy Security and Japan-China Relations: Competition or Cooperation?
by Minoura, Haruna, M.A.  The George Washington University. 2011: 222 pages; 1496651.
286.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
287.
Thailand's energy security: Strategic Petroleum Reserve and its economic impacts
by Leesombatpiboon, Poonpat, Ph.D.  The George Washington University. 2010: 257 pages; 3403306.
288.
Parental payment abuse within the Supplemental Security Income program
by Taylor-King, Darlean, Ph.D.  Walden University. 2008: 154 pages; 3342465.
289.
Addressing school safety and security concerns in a Trinidad-Tobago community: A Delphi study
by Ross-Quamina, Charlene, Ed.D.  University of Phoenix. 2015: 200 pages; 3730829.
291.
Unconventional warfare in U.S. foreign policy: U.S. support of insurgencies in Afghanistan, Nicaragua, and Iraq from 1979-2001
by Linnington, Abigail T., Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 367 pages; 3559052.
292.
A framework for cost-sensitive automated selection of intrusion response
by Strasburg, Christopher Roy, M.S.  Iowa State University. 2009: 76 pages; 1468160.
293.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
298.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
299.
No one in charge: A new theory of coordination and an analysis of US civil-military coordination in Afghanistan 2001–2009
by Strimling Yodsampa, Andrea, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2011: 412 pages; 3465447.
300.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
271 - 300 of 17367 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest