Spelling suggestions: "subject:"data encryption"" "subject:"mata encryption""
81 |
Interleaver design for the circular simplex turbo block coded modulatorChinchilla, Rigoberto. January 2003 (has links)
Thesis (Ph. D.)--Ohio University, November, 2003. / Title from PDF t.p. Includes bibliographical references (leaves 84-85).
|
82 |
On information hiding techniques for digital imagesBrisbane, Gareth Charles Beattie. January 2004 (has links)
Thesis (Ph.D.)--University of Wollongong, 2004. / Typescript. Includes bibliographical references: leaf 195-202.
|
83 |
Security primitives for ultra-low power sensor nodes in wireless sensor networks An-Lun (Alan) Huang.Huang, An-Lun. January 2005 (has links)
Thesis (M. Eng. (Computer Engineering)) -- Universiteit van Pretoria, 2005. / Includes bibliographical references.
|
84 |
Secure public instant messaging /Mannan, Mohammad Abdul, January 1900 (has links)
Thesis (M.C.S.) Carleton University, 2005. / Includes bibliographical references (p. 106-121). Also available in electronic format on the Internet.
|
85 |
Synchronization of chaotic circuits through real channels /Barnes, Wayne. January 1994 (has links)
Report (M.S.)--Virginia Polytechnic Institute and State University, 1994. / Abstract. Includes bibliographical references (leaf 32). Also available via the Internet.
|
86 |
Investigation into the impacts of migration to emergent NSA Suite B encryption standardsVenema, Jacob Paul. Shu, Jonathan Lee Yee. January 2009 (has links) (PDF)
Thesis (M.S. in Systems Technology (Command, Control & Communications (C3)))--Naval Postgraduate School, June 2009 by Jacob P. Venema. Thesis (M.S. in Software Engineering)--Naval Postgraduate School, June 2009 by Jonahan Lee Yee Shu. / Thesis Advisor(s): Fulp, John D. ; Riehle, Richard. "June 2009." Description based on title screen as viewed on July 14, 2009. Author(s) subject terms: elliptical curve cryptography, ECC, Rivest Shamir and Adleman, RSA, NSA Suite B, encryption, digital signature, key agreement, ECC migration, risk mitigation. Includes bibliographical references (p. 95-98). Also available in print.
|
87 |
Designing authenication scheme for wireless sensor networksWang, Ke, January 2009 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2009. / Includes bibliographical references (leaves 85-101). Also available in print.
|
88 |
Security in serverless network environments /Holtje, Carl. January 2004 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2004. / Typescript. Includes bibliographical references (p. [113]-115).
|
89 |
Hardware encryption using the MPC180 security co-processor /Banerjee, Uday. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2004. / Printout. Includes bibliographical references (leaves 59-60). Also available on the World Wide Web.
|
90 |
The design of a test environment and its use in verification of a scalable modular multiplication and exponentiation /Khair, Elias. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2004. / Typescript (photocopy). Includes bibliographical references (leaves 53-54). Also available on the World Wide Web.
|
Page generated in 0.2573 seconds