• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 776
  • 132
  • 121
  • 68
  • 66
  • 36
  • 27
  • 24
  • 12
  • 12
  • 8
  • 7
  • 7
  • 7
  • 6
  • Tagged with
  • 1462
  • 515
  • 463
  • 314
  • 236
  • 232
  • 221
  • 197
  • 162
  • 159
  • 156
  • 144
  • 134
  • 134
  • 111
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
441

Cryptography and its application to operating system security /

Painchaud, Michelle. January 1981 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 1981. / Typescript. Includes bibliographical references.
442

Investigation into the impacts of migration to emergent NSA Suite B encryption standards

Venema, Jacob Paul. Shu, Jonathan Lee Yee. January 2009 (has links) (PDF)
Thesis (M.S. in Systems Technology (Command, Control & Communications (C3)))--Naval Postgraduate School, June 2009 by Jacob P. Venema. Thesis (M.S. in Software Engineering)--Naval Postgraduate School, June 2009 by Jonahan Lee Yee Shu. / Thesis Advisor(s): Fulp, John D. ; Riehle, Richard. "June 2009." Description based on title screen as viewed on July 14, 2009. Author(s) subject terms: elliptical curve cryptography, ECC, Rivest Shamir and Adleman, RSA, NSA Suite B, encryption, digital signature, key agreement, ECC migration, risk mitigation. Includes bibliographical references (p. 95-98). Also available in print.
443

The design of a test environment and its use in verification of a scalable modular multiplication and exponentiation /

Khair, Elias. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2004. / Typescript (photocopy). Includes bibliographical references (leaves 53-54). Also available on the World Wide Web.
444

Secure distribution of open source information /

Rogers, Jason Lee. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004. / Thesis advisor(s): George Dinolt. Includes bibliographical references (p. 57-59). Also available online.
445

Performance analysis of a scalable hardware FPGA Skein implementation /

Schorr, Aric. January 2010 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2010. / Typescript. Includes bibliographical references (leaves 57-58).
446

Cube attacks on cryptographic hash functions /

Lathrop, Joel. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 62-65).
447

Forward security from bilinear pairings signcryption and threshold signature /

Chow, Sze-ming, Sherman. January 2004 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2005. / Title proper from title frame. Also available in printed format.
448

The wisdom of crowds as a model for trust and security in peer groups

Whitney, Justin D. January 2005 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: threshold cryptography; file sharing; security; peer to peer; p2p; trust. Includes bibliographical references. (p.84-87)
449

Anonymous T-out-of-N threshold signature schemes

Maneva-Jakimoska, Karolina. Burmester, Mike. January 2006 (has links)
Thesis (M.S.)--Florida State University, 2006. / Advisor: Mike Burmester, Florida State University,College of Arts amd Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 19, 2006). Document formatted into pages; contains viii, 40 pages. Includes bibliographical references.
450

Cryptography for ultra-low power devices

Kaps, Jens-Peter E. January 2006 (has links)
Dissertation (Ph.D.)--Worcester Polytechnic Institute. / Keywords: rfid, wireless sensor networks, low energy, low power, cryptography. Includes bibliographical references (p.153-172).

Page generated in 0.3296 seconds