Spelling suggestions: "subject:"data encryption"" "subject:"data ancryption""
61 |
Efficient NTRU implementationsO'Rourke, Colleen Marie. January 2002 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: NTRU; cryptography; scalable multiplier; unified multiplier; Montgomery multiplier. Includes bibliographical references (p. 85-88).
|
62 |
Session hijacking attacks in wireless local area networks /Onder, Hulusi. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2004. / Thesis advisor(s): Geoffrey Xie. Includes bibliographical references (p. 131-132). Also available online.
|
63 |
Responding to policies at runtime in TrustBuilder /Smith, Bryan, January 2004 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2004. / Includes bibliographical references (p. 41-44).
|
64 |
Preserving trust across multiple sessions in open systems /Chan, Fuk Wing Thomas, January 2004 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2004. / Includes bibliographical references (p. 47-48).
|
65 |
High-performance advanced encryption standard (AES) security co-processor designTandon, Prateek, January 2003 (has links) (PDF)
Thesis (Ph. D.)--School of Electrical and Computer Engineering, Georgia Institute of Technology, 2004. Directed by Hsien-Hsin S. Lee. / Includes bibliographical references (leaves 55-58).
|
66 |
Visual cryptography for color images : formal security analysis and new construction /Leung, Wing Pan. January 2009 (has links) (PDF)
Thesis (M.Phil.)--City University of Hong Kong, 2009. / "Submitted to Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Philosophy." Includes bibliographical references (leaves 103-108)
|
67 |
Hardware implementation of message authentication algorithms for Internet security /Deepakumara, Janaka T., January 2002 (has links)
Thesis (M.Eng.)--Memorial University of Newfoundland, 2002. / Bibliography: leaves 143-152.
|
68 |
Image watermarking and data hiding techniques /Wong, Hon Wah. January 2003 (has links)
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references (leaves 163-178). Also available in electronic version. Access restricted to campus users.
|
69 |
Data hiding watermarking for halftone images /Fu, Ming Sun. January 2003 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2003. / Vita. Includes bibliographical references. Also available in electronic version. Access restricted to campus users.
|
70 |
Protecting sensitive credential content during trust negotiation /Jarvis, Ryan D., January 2003 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2003. / Includes bibliographical references (p. 51-54).
|
Page generated in 0.0966 seconds