• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 775
  • 132
  • 121
  • 68
  • 66
  • 36
  • 27
  • 24
  • 12
  • 12
  • 8
  • 7
  • 7
  • 7
  • 6
  • Tagged with
  • 1460
  • 515
  • 462
  • 314
  • 236
  • 232
  • 221
  • 196
  • 162
  • 158
  • 155
  • 144
  • 134
  • 134
  • 111
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

Genetic algorithms in cryptography /

Delman, Bethany. January 2003 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2004. / Typescript. Includes bibliographical references (leaves 85-87).
232

Optimizing scalar multiplication for Koblitz curves using hybrid FPGAs /

Głuszek, Gregory A. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 93-95).
233

Firewall resistance to metaferography in network communications /

Savacool, Richard. January 2010 (has links)
Typescript. Includes bibliographical references (p. 55-60).
234

A graphic user interface for rapid integration of steganography software /

Wootten, David Raiman. January 1996 (has links) (PDF)
Thesis (Master of Computer Science) Naval Postgraduate School, March 1996. / "March 1996." Thesis advisor(s): Cynthia E. Irvine, Michael J. Zyda. BIbliography: p. 125-127. Also available online.
235

An elliptic curve cryptography based key agreement protocol for wireless network security /

Sethi, Vibha, January 2006 (has links)
Thesis (M.S.) -- University of Texas at Dallas, 2006 / Includes vita. Includes bibliographical references (leaves [62-65]-)
236

Design and evaluation of an "FPGA based" hardware accelerator for elliptic curve cryptography point multiplication a thesis presented to the faculty of the Graduate School, Tennessee Technological University /

Gwalani, Kapil A., January 2009 (has links)
Thesis (M.S.)--Tennessee Technological University, 2009. / Title from title page screen (viewed on June 25, 2010). Bibliography: leaves 93-96.
237

Security models for authorization, delegation and accountability

Lui, W. C. January 2005 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
238

Correlation attacks on stream ciphers using convolutional codes

Bruwer, Christian S. January 2004 (has links)
Thesis (M.Eng.)(Electronic)--University of Pretoria, 2005. / Title from opening screen (viewed March 22, 2006). Includes summaries in English and Afrikaans. Includes bibliographical references.
239

Enhancements of the non-linear knapsack cryptosystem : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Science at the University of Canterbury /

Tu, Zhiqi. January 2006 (has links)
Thesis (M. Sc.)--University of Canterbury, 2006. / Typescript (photocopy). Includes bibliographical references (p. [93]-98). Also available via the World Wide Web.
240

A polynomial time algorithm for prime recognition

Domingues, Riaal. January 2006 (has links)
Thesis (M. Sc.)(Mathematics)--University of Pretoria, 2006. / Includes bibliographical references. Available on the Internet via the World Wide Web.

Page generated in 0.026 seconds