Spelling suggestions: "subject:"eomputer security"" "subject:"aomputer security""
191 |
A secure e-course copyright protection infrastructureYau, Cho-ki, Joe. January 2006 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
|
192 |
Active tamper-detector hardware mechanism and FPGA implementation /Lu, Qi Charles. January 2006 (has links)
Thesis (M.S.)--State University of New York at Binghamton, Electrical Engineering Dept., 2006. / Includes bibliographical references.
|
193 |
Fast software implementations of block ciphersSessions, Julian Brently 23 November 1998 (has links)
Three block ciphers are considered to determine how well they can be
implemented on existing superscalar architectures such as the Intel Pentium.
An examination of the Pentium architecture suggests that substantial
performance increases can be achieved if particular rules are followed.
Software libraries are written in high-level C language and low-level assembly
language to produce a package of routines which achieve a near optimal
performance level on a current processor architecture. The structure of each
algorithm is studied to determine if it is possible to alternatively implement the
algorithm such that certain steps are reordered or reduced. Using the Intel
MMX architectural advances, it is observed that one algorithm benefits
dramatically from a new implementation that takes advantage of MMX
strengths. / Graduation date: 1999
|
194 |
High-speed implementation of the RSA cryptosystemPeng, Yanqun 31 January 1995 (has links)
A public key cryptosystem allows two or more parties to securely communicate
over an insecure channel without establishing a physically secure channel for key
exchange. The RSA cryptosystem is the most popular public key cryptosystem ever
invented. It is based on the difficulty of factoring large composite numbers. Once the RSA
system is setup, i.e., the modulus, the private and public exponents are determined, and the
public components have been published, the senders as well as the receivers perform a
single operation for signing, encryption, decryption, and verification. This operation is the
computation of modular exponentiation. In this thesis, we focus on fast implementations
of the modular exponentiation operation. Several methods for modular exponentiation are
presented, including the binary method and the m-ary method. We give a general algorithm
of implementing the m-ary method, and some examples of the quaternary method
and the octal method. The standard multiplication and squaring algorithms are also discussed
as methods to implement the modular multiplication and squaring operations. Two
methods for performing the modular multiplication operation are given: the multiply and
reduce method and the Montgomery method. The Montgomery product algorithm is used
in the implementation of the modular exponentiation operation. The algorithms presented
in this thesis are implemented in C and 16-bit in-line 80486 assembly code. We have performed
extensive testing of the code, and obtained timing results which are given in the
last chapter of the thesis. / Graduation date: 1995
|
195 |
Security enhancement on the cryptosystem based on chaotic and elliptic curve cryptography /Man, Kwan Pok. January 2006 (has links) (PDF)
Thesis (M.Phil.)--City University of Hong Kong, 2006. / "Submitted to Department of Electronic Engineering in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 93-97)
|
196 |
Transference as a means of establishing trust in World Wide Web sites /Stewart, Katherine Josephine, January 2000 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2000. / Vita. Includes bibliographical references (leaves 128-152). Available also in a digital version from Dissertation Abstracts.
|
197 |
Implementation of information assurance risk management training into existing Department of the Navy training pipelines /Labert, Matthew J. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): Rex Buddenberg, Steven Iatrou. Includes bibliographical references (p. 119-120). Also available online.
|
198 |
Automated detection and containment of stealth attacks on the operating system kernelBaliga, Arati. January 2009 (has links)
Thesis (Ph. D.)--Rutgers University, 2009. / "Graduate Program in Computer Science." Includes bibliographical references (p. 99-103).
|
199 |
Distributed password crackingCrumpacker, John R. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Dinolt, George. Second Reader: Eagle, Chris. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Distributed password cracking, Berkeley Open Infrastructure for Network Computing (BOINC), and John the Ripper. Includes bibliographical references (p. 63-64). Also available in print.
|
200 |
Secure passwords through enhanced hashing /Strahs, Benjamin. January 2009 (has links)
Thesis (Honors)--College of William and Mary, 2009. / Includes bibliographical references (leaves 27-28).
|
Page generated in 0.05 seconds