Spelling suggestions: "subject:"data encryption"" "subject:"mata encryption""
181 |
Advanced steganographic and steganalytic methods in the spatial domainSoukal, David. January 2006 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Computer Science Department, 2006. / Includes bibliographical references.
|
182 |
Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs /Ramsey, Glenn. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (p. 95-97).
|
183 |
Securing RSVP and RSVP-TE signaling protocols and their performance study /Zhi, Jing, January 1900 (has links)
Thesis (M. Sc.)--Carleton University, 2004. / Includes bibliographical references (p. 96-101). Also available in electronic format on the Internet.
|
184 |
Coding encrypted messages into music /Kumar, Vinay Réginald, January 1900 (has links)
Thesis (M.Sc.) - Carleton University, 2006. / Includes bibliographical references (p. 91-93). Also available in electronic format on the Internet.
|
185 |
Source authentication in group communicationAl-Ibrahim, Mohamed Hussain. January 2005 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Dept. of Computing, 2004. / Title from screen page; viewed 10 Oct 2005. Bibliography: leaves 163-175. Also available in a print form.
|
186 |
Analysis and design of cryptographic hash functionsKasselman, Pieter Retief. January 2006 (has links)
Thesis (M.Eng.(Electronic Engineering))--University of Pretoria, 1999. / Summaries in Afrikaans and English. Includes bibliographical references.
|
187 |
Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basisKilcrease, Patrick N. January 2009 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.
|
188 |
An enhanced method for the existing bluetooth pairing protocol to avoid impersonation attacksMendoza, Patricia A., January 2009 (has links)
Thesis (M.S.)--University of Texas at El Paso, 2009. / Title from title screen. Vita. CD-ROM. Includes bibliographical references. Also available online.
|
189 |
Formally evaluating wireless security protocolsCubukcu, Ilkay. Yasinsac, Alec. January 2005 (has links)
Thesis (M.S.)--Florida State University, 2005. / Advisor: Dr. Alec Yasinsac, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 7, 2005). Document formatted into pages; contains x, 149 pages. Includes bibliographical references.
|
190 |
A novel unified algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2[superscript]n) suitable for public-key cryptography /Tawalbeh, Lo'ai. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2005. / Printout. Includes bibliographical references (leaves 57-61). Also available on the World Wide Web.
|
Page generated in 0.1037 seconds