Spelling suggestions: "subject:"computer security"" "subject:"coomputer security""
411 |
Performance evaluation of eXtended sparse linearization in GF(2) and GR(2⁸) /Kaptanoǧlu, Tiǧin. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (p. 64-66).
|
412 |
Real-time network-based anomaly intrusion detectionBalupari, Ravindra. January 2002 (has links)
Thesis (M.S.)--Ohio University, 2002. / Title from PDF t.p.
|
413 |
Secure distributed single sign-on with two-factor authentication /Brasee, Kaleb. January 2007 (has links)
Thesis (M.S.)--University of Toledo, 2007. / Typescript. "Submitted as partial fulfillments of the requirements for the Master of Engineering with a concentration in Computer Science." "A thesis entitled"--at head of title. Bibliography: leaves 69-72.
|
414 |
Oblivious transfer protocols for securing electronic commerce /Zhang, Jun Qi. January 2002 (has links)
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2001. / "A thesis submitted for the degree of Master of Science at University of Western Sydney, February 2002" Bibliography : p. 107-113.
|
415 |
Security techniques for electronic commerce applications /Zhao, Weiliang. January 2003 (has links)
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2003. / "A thesis submitted for the degree of Master of Science (Honours) - Computing and Information Technology at University of Western Sydney" Bibliography : leaves 109-114.
|
416 |
An approach to graph-based modeling of network exploitationsLi, Wei, January 2005 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
417 |
Combining static analysis and dynamic learning to build context sensitive models of program behaviorLiu, Zhen, January 2005 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
418 |
Exploring extensions of traditional honeypot systems and testing the impact on attack profilingMcGrew, Robert Wesley, January 2005 (has links)
Thesis (M.S.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
419 |
Digital signature schemes : general framework and fail stop signatures /Pfitzmann, Birgit. January 1996 (has links)
Univ., Diss.--Hildesheim, 1993. / Literaturverz. S. 371 - 385.
|
420 |
Robust digital watermarking of multimedia objectsGupta, Gaurav. January 2008 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008. / Bibliography: p. 144-153.
|
Page generated in 0.0711 seconds