Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17035 open access dissertations and theses found for:
if(Security)  »   Refine Search
271.
China-Philippine Joint Explorations: The Future of Competition and Cooperation in the South China Sea
by Tackett, Trevor M., M.A.  The George Washington University. 2018: 84 pages; 10822348.
272.
The laws will fall silent: Ex Parte Quirin, a troubling precedent for military commissions
by Luebbert, Brad P., M.A.  University of Louisville. 2010: 118 pages; 1485151.
274.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
275.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
276.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
277.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
278.
Is Pursuing Nuclear Energy in India's Strategic Interest?
by Rajashekaran, Dhruv, M.A.  Webster University. 2014: 93 pages; 1526151.
279.
Balancing belligerents or feeding the beast: Transforming conflict traps
by Hayden, Nancy K., Ph.D.  University of Maryland, College Park. 2016: 474 pages; 10130005.
280.
Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP)
by Byambajav, Dolgorsuren, M.S.  California State University, Long Beach. 2011: 76 pages; 1504435.
282.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
283.
Unconventional warfare in U.S. foreign policy: U.S. support of insurgencies in Afghanistan, Nicaragua, and Iraq from 1979-2001
by Linnington, Abigail T., Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 367 pages; 3559052.
284.
A framework for cost-sensitive automated selection of intrusion response
by Strasburg, Christopher Roy, M.S.  Iowa State University. 2009: 76 pages; 1468160.
287.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
289.
No one in charge: A new theory of coordination and an analysis of US civil-military coordination in Afghanistan 2001–2009
by Strimling Yodsampa, Andrea, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2011: 412 pages; 3465447.
290.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
291.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
292.
Understanding Federal Cybersecurity Culture: An Expert Perspective on Current and Ideal State
by Sousane, Richard, Ed.D.  The George Washington University. 2018: 198 pages; 10785377.
296.
298.
Developing Online Trust in Electronic Commerce: A Generational Cohort Study in Puerto Rico
by López Rivera, Ibrahim, D.B.A.  Universidad del Turabo (Puerto Rico). 2016: 119 pages; 10279353.
299.
Towards usable end-user authentication
by Tanviruzzaman, Mohammad, Ph.D.  Marquette University. 2014: 138 pages; 3623762.
271 - 300 of 17035 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest