• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 1
  • Tagged with
  • 10
  • 10
  • 10
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Defining a sample template for governmental procurements of cryptographic products/

Taş, Levent. Koltuksuz Ahmet Hasan January 2006 (has links) (PDF)
Thesis (Master)--İzmir Institute Of Technology, İzmir, 2006 / Keywords: Specification, crytography. Includes bibliographical references (leaves. 46-47).
2

Creating a robust form of steganography /

Buchanan, Joshua Michael. January 2004 (has links)
Thesis (M.S.)--Wake Forest University. Dept. of Computer Science, 2004. / Includes bibliographical references (leaves 99-100).
3

A cryptosystem based on chaotic and elliptic curve cryptography /

Ho, Sun Wah. January 2005 (has links) (PDF)
Thesis (M.Phil.)--City University of Hong Kong, 2005. / "Submitted to Department of Computer Engineering and Information Technology in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 109-111)
4

An exploration of covert channels within voice over IP /

Lloyd, Patrick. January 2010 (has links)
Typescript. Includes bibliographical references (leaves 63-66).
5

Security enhancement on the cryptosystem based on chaotic and elliptic curve cryptography /

Man, Kwan Pok. January 2006 (has links) (PDF)
Thesis (M.Phil.)--City University of Hong Kong, 2006. / "Submitted to Department of Electronic Engineering in partial fulfillment of the requirements for the degree of Master of Philosophy" Includes bibliographical references (leaves 93-97)
6

Security models for authorization, delegation and accountability

Lui, W. C. January 2005 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
7

Authentication protocols in pervasive computing

Long, Nguyen Hoang January 2009 (has links)
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably identity theft, and creates new requirements for secure communication. A recently proposed approach to creating secure communication is to use human trust and human interactions. These approaches potentially eliminate the need for passwords as in Bluetooth, shared secrets or trusted parties, which are often too complex and expensive to use in portable devices. In this new technology, handheld devices exchange data (e.g. payment, heart rates or public keys) over some medium (e.g. WiFi) and then display a short and non-secret digest of the protocol's run that the devices' human owners manually compare to ensure they agree on the same data, i.e. human interactions are used to prevent fraud. In this thesis, we present several new protocols of this type which are designed to optimise the work required of humans to achieve a given level of security. We discover that the design of these protocols is influenced by several principles, including the ideas of commitment without knowledge and separation of security concerns, where random and cryptographic attacks should be tackled separately. Underpinning the technology is a new cryptographic function, termed a keyed digest function, which produces a short number for humans to compare. This is similar to the notion of a universal hash function, but its output length is shorter (e.g. 16 bits). Hence, it should be faster to compute. We propose several digest constructions using Toeplitz matrices, integer multiplication and pseudorandom numbers. The application of digest functions leads us to develop more efficient alternatives to standard digital signatures. Our protocol security analysis leads to a new bound on the key length for an almost universal hash function, which can be derived by the pigeon-hole principle. The new bound turns out to be tighter than another similar bound derived from the combination of the Singleton bound in coding theory and an equivalence between error-correcting codes and almost universal hash functions.
8

Decentralizovaný komunikační nástroj s garancí anonymity / Decentralized communication tool with anonymity guarantee

Legéň, Michal January 2010 (has links)
Anonymity on the internet is becoming a actuall issue nowadays. There are several tools, that can be used to monitor user's activity and it can lead to lose privacy of users. The aim of this master's thesis is to describe different ways of working anonymous systems, especially the method called Onion Routing. The introduction of this work is devoted to the description of this method together with asymmetric cryptosystem RSA. The second part belongs to basics of socket programming and to the implementation of anonymous system in programming language C++. The final part is focussed on analysis of system in terms of security and time complexity. The conditions of anonymity and decentralization are accomplished. There is no presence of central server in the system and the management is handled by signalling messages.
9

Digital signature schemes : general framework and fail stop signatures /

Pfitzmann, Birgit. January 1996 (has links)
Univ., Diss.--Hildesheim, 1993. / Literaturverz. S. 371 - 385.
10

Anonymous T-out-of-N threshold signature schemes

Maneva-Jakimoska, Karolina. Burmester, Mike. January 2006 (has links)
Thesis (M.S.)--Florida State University, 2006. / Advisor: Mike Burmester, Florida State University,College of Arts amd Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 19, 2006). Document formatted into pages; contains viii, 40 pages. Includes bibliographical references.

Page generated in 0.0928 seconds