Spelling suggestions: "subject:"data encryption"" "subject:"mata encryption""
191 |
Implementation of a forward error correction technique using convolutional encoding with Viterbi decoding /Rawat, Sachin. January 2004 (has links)
Thesis (M.S.)--Ohio University, March, 2004. / Includes bibliographical references (p. 90-91).
|
192 |
A watermarking protocol for digital contents distribution /Curreem, Hanif. January 2002 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002. / Includes bibliographical references (leaves 65-68). Also available in electronic version. Access restricted to campus users.
|
193 |
Several variants and generalizations of Shamir's secret sharing scheme /Lai, Chun-Pong. January 2002 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002. / Includes bibliographical references (leaves 55-58). Also available in electronic version. Access restricted to campus users.
|
194 |
Towards securing networks of resource constrained devices a study of cryptographic primitives and key distribution schemes /Chan, Kevin Sean. January 2008 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009. / Committee Chair: Fekri, Faramarz; Committee Member: James McClellan; Committee Member: John Copeland; Committee Member: Steven McLaughlin; Committee Member: Yajun Mei. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
195 |
Architectural support for improving security and performance of memory sub-systemsYan, Chenyu. January 2008 (has links)
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2009. / Committee Chair: Milos Prvulovic; Committee Member: Gabriel Loh; Committee Member: Hyesoon Kim; Committee Member: Umakishore Ramachandran; Committee Member: Yan Solihin. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
196 |
Multimedia lightweight encryption via randomized entropy coding /Zhou, Jiantao. January 2009 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2009. / Includes bibliographical references (p. 123-130).
|
197 |
Kernel methods in steganalysisPevný, Tomáš. January 2008 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Computer Science, 2008. / Includes bibliographical references.
|
198 |
Java performance of the Rijndael encryption algorithm across compilers and virtual machines /Orgill, Gregory Leavitt, January 2005 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. School ofTechnology, 2005. / Includes bibliographical references (p. 81-84).
|
199 |
Implementation of selected cryptographic algorithms on a reconfigurable microprocessor platform /Cook, Andrew L., January 2003 (has links)
Thesis (M.Eng.)--Memorial University of Newfoundland, 2003. / Bibliography: leaves 99-106. Also available online.
|
200 |
Design of a flexible cryptographic hardware module /House, Andrew W. H., January 2004 (has links)
Thesis (M.Eng.)--Memorial University of Newfoundland, 2004. / Bibliography: leaves 188-195.
|
Page generated in 0.0925 seconds