Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1185 open access dissertations and theses found for:
if(Xor encryption)  »   Refine Search
2.
Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography
by Ghosh, Debeshi D., M.S.  California State University, Long Beach. 2017: 39 pages; 10263604.
3.
High Performance Cryptography for Electronic Product Code for Internet of Things Applications
by Shah, Niyati, M.S.  University of Louisiana at Lafayette. 2017: 67 pages; 10682396.
4.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
5.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
6.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
7.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
8.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
9.
Image encryption with reversible data hiding by using least significant bits transformation
by Yallanuru, Bhaskar, M.S.  California State University, Long Beach. 2016: 35 pages; 1606099.
10.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
11.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
12.
Secure file transfers using mobile device
by Maddirala, Raghunath R., M.S.  California State University, Long Beach. 2010: 71 pages; 1481747.
13.
64-bit high efficiency binary comparator in quantum-dot cellular automata
by Patalay, Dinkar, M.S.  California State University, Long Beach. 2016: 49 pages; 10111200.
14.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
15.
Development of PHP to UMPL transformer
by Hu, Zili, Ed.D.  Ball State University. 2013: 245 pages; 3590414.
16.
Formal Modeling and Verification of Delay-Insensitive Circuits
by Park, Hoon, Ph.D.  Portland State University. 2015: 187 pages; 3743768.
17.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
18.
GPU-Assisted Cryptography of Log-Structured Indices
by Kirby, Michael Warren, M.S.  University of Colorado at Boulder. 2012: 71 pages; 1511983.
19.
Advanced bit manipulation instructions: Architecture, implementation and applications
by Hilewitz, Yedidya, Ph.D.  Princeton University. 2008: 232 pages; 3332424.
20.
Auxiliary Roles in STT-MRAM Memory
by Das, Jayita, Ph.D.  University of South Florida. 2014: 122 pages; 3666526.
21.
22.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
23.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
24.
Design of a low power asynchronous Viterbi decoder for wireless communications
by Deshpande, Parikshit, M.S.  California State University, Long Beach. 2016: 47 pages; 10142986.
25.
Smart Real-time Image Processing for Ultrasounds Using Cellular Neural Network
by Ayoubi, Randa, Ph.D.  University of Louisiana at Lafayette. 2014: 123 pages; 3711169.
26.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
27.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
28.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
29.
Real-time solid voxelization using multi-core pipelining
by Liao, Duoduo, Ph.D.  The George Washington University. 2009: 191 pages; 3344878.
30.
Computer Vision and Image Processing: Development and Optimization of MATLAB CVIP Toolbox
by Mishra, Deependra, M.S.  Southern Illinois University at Edwardsville. 2018: 92 pages; 10807716.
1 - 30 of 1185 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest