• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 691
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1069
  • 1069
  • 305
  • 273
  • 220
  • 216
  • 207
  • 198
  • 156
  • 115
  • 110
  • 104
  • 101
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Information hiding

Le, Tri Van. Desmedt, Yvo. January 2004 (has links)
Thesis (Ph. D.)--Florida State University, 2004. / Advisor: Dr. Yvo Desmedt, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (June 18, 2004). Includes bibliographical references.
202

Automatic validation of secure authentication protocols

Kim, Kyoil, January 2003 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Vita. Includes bibliographical references. Available also from UMI Company.
203

Identifying security problems and devising control solutions in a local area network a case study approach /

Evans, Gary John. January 1990 (has links) (PDF)
Thesis (M.S. in Information Systems)--Naval Postgraduate School, September 1990. / Thesis Advisor(s): Tung Xuan Bui. Second Reader: Smith, Henry H. "September 1990." Description based on title screen as viewed on December 16, 2009. DTIC Identifier(s): Local area networks, security, control systems, thesis. Author(s) subject terms: Computer security, local area network (LAN), security and control. Includes bibliographical references (p. 87-90). Also available in print.
204

Defending IEEE 802.11-based networks against denial of service attacks /

Tan, Boon Hwee. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2003. / Thesis advisor(s): William J. Ray, Man-Tak Shing. Includes bibliographical references (p. 115). Also available online.
205

Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump /

Holmgren, Jonathan S. Rich, Ronald P. January 2003 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2003. / Thesis advisor(s): George Dinolt, Craig Rasmussen. Includes bibliographical references (p. 155-157). Also available online.
206

A generic software architecture for deception-based intrusion detection and response systems /

Uzuncaova, Engin. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science and M.S. in Software Engineering)--Naval Postgraduate School, March 2003. / Thesis advisor(s): James Bret Michael, Richard Riehle. Includes bibliographical references (p. 63-66). Also available online.
207

Estimating reliability impact of biometric devices in large scale applications

Mahadevan, Karthikeyan. January 2003 (has links)
Thesis (M.S.)--West Virginia University, 2003. / Title from document title page. Document formatted into pages; contains vii, 66 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 62-64).
208

Security architects in practice

Lakshminarayanan, Vidya L. 01 September 2015 (has links)
While security has long been a significant issue in military systems, the spread of the internet has stimulated a growing interest in, and increasing demand for, secure systems. Understanding how architects manage security requirements in practice is a necessary first step in providing repeatable processes using effective techniques, methods, and architectural structures. In this thesis, I present the results of multiple cases of practicing security architects: key aspects in security requirements, critical issues in managing security requirements, essential characteristics of security architects, how architects define security architecture, and how requirements are transformed into architectures and implemented.
209

Hop integrity: a defense against denial-of-service attacks

Huang, Chin-Tser 28 August 2008 (has links)
Not available / text
210

Security and usability in click-based authentication systems

al-Khateeb, Haider January 2011 (has links)
Web applications widely use text passwords to confirm people‟s identity. However, investigations reveal text passwords have many problems and that there is a need for alternative solutions. For instance, users often forget their passwords, choose passwords which are easy-to-guess or vulnerable to cracking tools. Further, people write passwords down and/or share them with others. In addition, phishing attacks (using fraudulent websites to steal users‟ credentials) continue to cost millions of dollars every year. During the second half of 2009, the Anti-Phishing Working Group (APWG) reported 126,697 unique phishing attacks worldwide. As such, one of this research‟s objectives is to investigate public awareness of, and attitude towards, text password security and usability supported by surveying both up-to-date literature and users. The aim of this research is to develop an alternative solution using visual passwords (VPs) to authenticate users on web applications and investigate its security and usability. A VP can be many things: a set of images used as a login portfolio, click-points inside images or a doodle (signature) drawn by a user. Since text passwords are favoured for their usability over tokens and biometrics, the research scope has been set to investigate alternative ideas which do not require resources additional to standard computer devices used to sustain human-computer interactions, such as mouse and keyboard. VPs have the potential to develop an alternative solution within this scope. A comprehensive survey of the VP schemes found in the literature is conducted followed by a security and usability evaluation in which click-based systems are selected as the most suitable approach to achieve the aims and objectives of this research. Click- iii based systems are VP authentication schemes in which the VP is a sequence of click-points performed on one or more images. Further, user perceptions were investigated to study their acceptance of various authentication mechanisms and techniques. A novel click-based scheme is presented and developed throughout the research to introduce and investigate novel ideas to maintain security and usability simultaneously. It can resist multiple phishing and shoulder-surfing attacks without revealing the full user credentials. Further, the layout is designed to prevent MiTM attacks, also known as the second generation of phishing attacks. The VP is hashed to resist database attacks and the password space is extremely large compared to text passwords to resist brute force attacks. It has dual cues to maintain memorability and password recall is easy even when it is system-generated. Usability is considered through observation and laboratory studies to meet the requirements of HCI-Sec (Secure Human-Computer Interactions) aiming to present a secure scheme people can actually use.

Page generated in 0.2221 seconds