Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
14287 open access dissertations and theses found for:
if(User authentication)  »   Refine Search
1.
Towards usable end-user authentication
by Tanviruzzaman, Mohammad, Ph.D.  Marquette University. 2014: 138 pages; 3623762.
2.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
5.
6.
IDnet Mesh: Towards user accountability for the Internet
by Deng, Leiwen, Ph.D.  Northwestern University. 2010: 134 pages; 3402413.
7.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
8.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
9.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
10.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
11.
An Analysis of Remote Biometric Authentication with Windows
by Eyers, Brandy Marie, M.S.C.S.  University of South Florida. 2011: 42 pages; 1490509.
12.
Towards Effective Third-Party Application Dialogs: Solutions for Improved Attention and Comprehension
by Javed, Yousra, Ph.D.  The University of North Carolina at Charlotte. 2017: 211 pages; 10618024.
13.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
14.
Autonomous vehicle two-factor authentication: Safety in keyless vehicle systems
by Tse, Gilbert, M.S.  California State University, Long Beach. 2016: 43 pages; 10105281.
16.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
17.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
18.
Faculty Perceptions Regarding Authentication of Online Students' Identities and Academic Dishonesty
by McMillan, Stephanie Renee, D.A.  George Mason University. 2012: 252 pages; 3518808.
19.
20.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
21.
Use of image-based mnemonic techniques to enhance the memorability of user-generated passwords
by Nelson, Deborah L., M.S.  California State University, Long Beach. 2009: 108 pages; 1466145.
22.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
23.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
24.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
25.
Efficient Public-Key Watermark Techniques for Authentication
by Jiang, Feng, Ph.D.  Purdue University. 2017: 124 pages; 10618833.
26.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
27.
Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP)
by Byambajav, Dolgorsuren, M.S.  California State University, Long Beach. 2011: 76 pages; 1504435.
28.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
29.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
30.
Perceived Security and Usage of a Mobile Payment Application
by Sieger, Hanul, Eng.D.  Technische Universitaet Berlin (Germany). 2015: 132 pages; 10703767.
1 - 30 of 14287 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest