Spelling suggestions: "subject:"computer networks cryptography."" "subject:"computer networks ryptography.""
1 |
CRYPTO-AD-HOC network an ad hoc network protocol embedded cryptography /Suh, Kyungjoo. January 2002 (has links)
Thesis (M.S.)--University of Florida, 2002. / Title from title page of source document. Document formatted into pages; contains x, 80 p.; also contains graphics. Includes vita. Includes bibliographical references.
|
2 |
Firewall resistance to metaferography in network communications /Savacool, Richard. January 2010 (has links)
Typescript. Includes bibliographical references (p. 55-60).
|
3 |
The wisdom of crowds as a model for trust and security in peer groupsWhitney, Justin D. January 2005 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: threshold cryptography; file sharing; security; peer to peer; p2p; trust. Includes bibliographical references. (p.84-87)
|
4 |
Primitives and schemes for non-atomic information authenticationJakimoski, Goce. Burmester, Mike. Desmedt, Yvo. January 2006 (has links)
Thesis (Ph. D.)--Florida State University, 2006. / Advisors: Mike Burmester, Yvo Desmedt, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 9, 2006). Document formatted into pages; contains x, 104 pages. Includes bibliographical references.
|
5 |
Contributions to security in wireless ad-hoc networksNg, Ching Yu. January 2005 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2005. / Typescript. This thesis is subject to a 6 month embargo (12/12/05 to 12/06/06) and may only be viewed and copied with the permission of the author. For further information please Contact the Archivist. Includes bibliographical references: leaf 65-72.
|
Page generated in 0.0928 seconds