Spelling suggestions: "subject:"data encryption"" "subject:"mata encryption""
91 |
Secure distribution of open source information /Rogers, Jason Lee. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004. / Thesis advisor(s): George Dinolt. Includes bibliographical references (p. 57-59). Also available online.
|
92 |
Xor based optical encryption with noise performance modeling and application to image transmission over wireless IP lan /Zhang, Bo. January 1900 (has links)
Thesis (MTech (Information Technology))--Peninsula Technikon, 2004. / Word processed copy. Summary in English. Includes bibliographical references (leaves 117-120). Also available online.
|
93 |
The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments /Salles, Ernesto J. January 2002 (has links) (PDF)
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, September 2002. / Thesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
|
94 |
A lightweight key distribution mechanism for wireless sensor networksCompton-Drake, Lynsey Elizabeth. January 2009 (has links) (PDF)
Thesis (M.S. in computer engineering)--Washington State University, May 2009. / Title from PDF title page (viewed on Aug. 5, 2009). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 29-31).
|
95 |
Cube attacks on cryptographic hash functions /Lathrop, Joel. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 62-65).
|
96 |
A new class of unbalanced CAST ciphers and its security analysis /Zhu, Xia, January 1997 (has links)
Thesis (M. Eng.)--Memorial University of Newfoundland, 1997. / Bibliography: leaves 112-117.
|
97 |
Design and implementation of an advanced substitution-permutation encryption network /Xu, Jianhong, January 1997 (has links)
Thesis (M. Eng.), Memorial University of Newfoundland, 1998. / Restricted until June 2008. Bibliography: leaves 87-89.
|
98 |
Methodologies for power analysis attacks on hardware implementations of AES /Smith, Kenneth James. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 96-97).
|
99 |
Distributed pre-computation for a cryptanalytic time-memory trade-off /Taber, Michael S. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 106-107).
|
100 |
Differential power analysis on light weight implementations of block ciphersYalla, Panasayya S.V.V.K January 2009 (has links)
Thesis (M.S.)--George Mason University, 2009. / Vita: p. 60. Thesis director: Jens-Peter Kaps. Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering. Title from PDF t.p. (viewed Nov. 11, 2009). Includes bibliographical references (p. 57-59). Also issued in print.
|
Page generated in 0.0888 seconds