• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 124
  • 23
  • 13
  • 12
  • 11
  • 5
  • 2
  • Tagged with
  • 222
  • 222
  • 58
  • 40
  • 37
  • 34
  • 28
  • 26
  • 23
  • 22
  • 22
  • 20
  • 20
  • 19
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Random bit interleaving for trunk link encryption /

Einicke, Garry A. January 1990 (has links) (PDF)
Thesis (M.E.)--University of Adelaide, Dept. of Electrical and Electronic Engineering, 1991. / Includes bibliographical references (leaves 112-115).
12

Tunnel filters and optical amplifiers for use in fiber optic communication systems /

Raad, Bechara, January 1991 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1991. / Vita. Abstract. Includes bibliographical references (leaves 103-105). Also available via the Internet.
13

The network(ed) economy the nature, adoption and diffusion of communication standards /

Beck, Roman January 1900 (has links)
Dissertation -- Universität Frankfurt am Main, 2006. / Includes bibliographical references.
14

Optimization problems in telecommunications and the internet

Oliveira, Carlos A. S. January 2004 (has links)
Thesis (Ph. D.)--University of Florida, 2004. / Title from title page of source document. Document formatted into pages; contains 158 pages. Includes vita. Includes bibliographical references.
15

Wireline channel estimation and equalization /

Lu, Biao, January 2000 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2000. / Vita. Includes bibliographical references (leaves 128-140). Available also in a digital version from Dissertation Abstracts.
16

Site-specific propagation prediction for wireless in-building personal communication system design /

Seidel, Scott Y., January 1993 (has links)
Thesis (Ph. D.)--Virginia Polytechnic Institute and State University, 1993. / Vita. Abstract. Includes bibliographical references (leaves 186-196). Also available via the Internet.
17

The network(ed) economy the nature, adoption and diffusion of communication standards /

Beck, Roman. January 1900 (has links)
Thesis--Universität Frankfurt am Main, 2006. / Description based on print version record. Includes bibliographical references.
18

The network(ed) economy the nature, adoption and diffusion of communication standards /

Beck, Roman. January 1900 (has links)
Dissertation -- Universitat Frankfurt am Main, 2006. / Includes bibliographical references. Also available in print.
19

Real-time communication and decentralized coordination methods for vehicles in intelligent transportation systems /

Tseng, Danny, January 2008 (has links)
Thesis (M.S.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 57-60)
20

Development of an M-commerce security framework

Murufu, Mufudzi Anesu Chapman January 2014 (has links)
Research shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts.

Page generated in 0.0418 seconds