Spelling suggestions: "subject:"computer security 6electronic commerce"" "subject:"computer security belectronic commerce""
1 |
An economic model of investment in information security /Ye, Ruyi. January 2004 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004. / Includes bibliographical references (leaves 39-41). Also available in electronic version. Access restricted to campus users.
|
2 |
User perception related to identification through biometrics within electronic businessGiesing, Ilse. January 2003 (has links)
Thesis (M.Com.)(Informatics)--University of Pretoria, 2003. / Includes bibliographical references.
|
3 |
Oblivious transfer protocols for securing electronic commerce /Zhang, Jun Qi. January 2002 (has links)
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2001. / "A thesis submitted for the degree of Master of Science at University of Western Sydney, February 2002" Bibliography : p. 107-113.
|
4 |
Security techniques for electronic commerce applications /Zhao, Weiliang. January 2003 (has links)
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2003. / "A thesis submitted for the degree of Master of Science (Honours) - Computing and Information Technology at University of Western Sydney" Bibliography : leaves 109-114.
|
5 |
The development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration /Mitchell, Marsha. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 102-103).
|
Page generated in 0.1118 seconds