• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 691
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1069
  • 1069
  • 305
  • 273
  • 220
  • 216
  • 207
  • 198
  • 156
  • 115
  • 110
  • 104
  • 101
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
411

Real-time network-based anomaly intrusion detection

Balupari, Ravindra. January 2002 (has links)
Thesis (M.S.)--Ohio University, 2002. / Title from PDF t.p.
412

Secure distributed single sign-on with two-factor authentication /

Brasee, Kaleb. January 2007 (has links)
Thesis (M.S.)--University of Toledo, 2007. / Typescript. "Submitted as partial fulfillments of the requirements for the Master of Engineering with a concentration in Computer Science." "A thesis entitled"--at head of title. Bibliography: leaves 69-72.
413

Oblivious transfer protocols for securing electronic commerce /

Zhang, Jun Qi. January 2002 (has links)
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2001. / "A thesis submitted for the degree of Master of Science at University of Western Sydney, February 2002" Bibliography : p. 107-113.
414

Security techniques for electronic commerce applications /

Zhao, Weiliang. January 2003 (has links)
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2003. / "A thesis submitted for the degree of Master of Science (Honours) - Computing and Information Technology at University of Western Sydney" Bibliography : leaves 109-114.
415

An approach to graph-based modeling of network exploitations

Li, Wei, January 2005 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
416

Combining static analysis and dynamic learning to build context sensitive models of program behavior

Liu, Zhen, January 2005 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
417

Exploring extensions of traditional honeypot systems and testing the impact on attack profiling

McGrew, Robert Wesley, January 2005 (has links)
Thesis (M.S.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
418

Digital signature schemes : general framework and fail stop signatures /

Pfitzmann, Birgit. January 1996 (has links)
Univ., Diss.--Hildesheim, 1993. / Literaturverz. S. 371 - 385.
419

Robust digital watermarking of multimedia objects

Gupta, Gaurav. January 2008 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008. / Bibliography: p. 144-153.
420

Security primitives for ultra-low power sensor nodes in wireless sensor networks An-Lun (Alan) Huang.

Huang, An-Lun. January 2005 (has links)
Thesis (M. Eng. (Computer Engineering)) -- Universiteit van Pretoria, 2005. / Includes bibliographical references.

Page generated in 0.0584 seconds