• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 690
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1068
  • 1068
  • 304
  • 273
  • 219
  • 216
  • 207
  • 198
  • 156
  • 115
  • 110
  • 104
  • 100
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

A secure e-course copyright protection infrastructure

Yau, Cho-ki, Joe. January 2006 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
192

Active tamper-detector hardware mechanism and FPGA implementation /

Lu, Qi Charles. January 2006 (has links)
Thesis (M.S.)--State University of New York at Binghamton, Electrical Engineering Dept., 2006. / Includes bibliographical references.
193

Fast software implementations of block ciphers

Sessions, Julian Brently 23 November 1998 (has links)
Three block ciphers are considered to determine how well they can be implemented on existing superscalar architectures such as the Intel Pentium. An examination of the Pentium architecture suggests that substantial performance increases can be achieved if particular rules are followed. Software libraries are written in high-level C language and low-level assembly language to produce a package of routines which achieve a near optimal performance level on a current processor architecture. The structure of each algorithm is studied to determine if it is possible to alternatively implement the algorithm such that certain steps are reordered or reduced. Using the Intel MMX architectural advances, it is observed that one algorithm benefits dramatically from a new implementation that takes advantage of MMX strengths. / Graduation date: 1999
194

High-speed implementation of the RSA cryptosystem

Peng, Yanqun 31 January 1995 (has links)
A public key cryptosystem allows two or more parties to securely communicate over an insecure channel without establishing a physically secure channel for key exchange. The RSA cryptosystem is the most popular public key cryptosystem ever invented. It is based on the difficulty of factoring large composite numbers. Once the RSA system is setup, i.e., the modulus, the private and public exponents are determined, and the public components have been published, the senders as well as the receivers perform a single operation for signing, encryption, decryption, and verification. This operation is the computation of modular exponentiation. In this thesis, we focus on fast implementations of the modular exponentiation operation. Several methods for modular exponentiation are presented, including the binary method and the m-ary method. We give a general algorithm of implementing the m-ary method, and some examples of the quaternary method and the octal method. The standard multiplication and squaring algorithms are also discussed as methods to implement the modular multiplication and squaring operations. Two methods for performing the modular multiplication operation are given: the multiply and reduce method and the Montgomery method. The Montgomery product algorithm is used in the implementation of the modular exponentiation operation. The algorithms presented in this thesis are implemented in C and 16-bit in-line 80486 assembly code. We have performed extensive testing of the code, and obtained timing results which are given in the last chapter of the thesis. / Graduation date: 1995
195

Security enhancement on the cryptosystem based on chaotic and elliptic curve cryptography /

Man, Kwan Pok. January 2006 (has links) (PDF)
Thesis (M.Phil.)--City University of Hong Kong, 2006. / "Submitted to Department of Electronic Engineering in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 93-97)
196

Transference as a means of establishing trust in World Wide Web sites /

Stewart, Katherine Josephine, January 2000 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2000. / Vita. Includes bibliographical references (leaves 128-152). Available also in a digital version from Dissertation Abstracts.
197

Implementation of information assurance risk management training into existing Department of the Navy training pipelines /

Labert, Matthew J. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): Rex Buddenberg, Steven Iatrou. Includes bibliographical references (p. 119-120). Also available online.
198

Automated detection and containment of stealth attacks on the operating system kernel

Baliga, Arati. January 2009 (has links)
Thesis (Ph. D.)--Rutgers University, 2009. / "Graduate Program in Computer Science." Includes bibliographical references (p. 99-103).
199

Distributed password cracking

Crumpacker, John R. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Dinolt, George. Second Reader: Eagle, Chris. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Distributed password cracking, Berkeley Open Infrastructure for Network Computing (BOINC), and John the Ripper. Includes bibliographical references (p. 63-64). Also available in print.
200

Secure passwords through enhanced hashing /

Strahs, Benjamin. January 2009 (has links)
Thesis (Honors)--College of William and Mary, 2009. / Includes bibliographical references (leaves 27-28).

Page generated in 0.0488 seconds