• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 258
  • 67
  • 64
  • 48
  • 45
  • 26
  • 20
  • 13
  • 7
  • 7
  • 7
  • 6
  • 3
  • 2
  • 2
  • Tagged with
  • 649
  • 194
  • 119
  • 101
  • 83
  • 83
  • 70
  • 62
  • 53
  • 53
  • 52
  • 50
  • 47
  • 46
  • 44
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
341

Trusted Mail Gateway

Ayla, Erkut Sinan 01 January 2005 (has links) (PDF)
ABSTRACT TRUSTED MAIL GATEWAY AYLA, Erkut Sinan M.S., Department of Computer Engineering Supervisor: Dr. Attila &Ouml / zgit December 2004, 135 pages The study aims to make contribution to solve mail security problems. The Trusted Mail Gateway provides a domain with the basic security services that are message integrity, confidentiality, non&amp / #8208 / repudiation, origin authentication and availability while message (e&amp / #8208 / mail) being delivered through the Internet. It generates S/MIME digital signatures and performs S/MIME encryption on behalf of the domain using secret key cryptography and public&amp / #8208 / key techniques and generating Cryptographic Message Syntax (CMS) data to provide origin authenticity, integrity and v confidentiality. It applies anti&amp / #8208 / virus control and protection, spam filtering and content check to both incoming mails to the domain and outgoing mails from the domain to prevent attacks against availability. Also, the Trusted Mail Gateway provides intra&amp / #8208 / domain security. It keeps e&amp / #8208 / mail messages in corresponding mailboxes as encrypted messages. Trusted Mail Gateway processes all the mails passing through and records processing results in database as notary information. Moreover, it establishes trust relations with other trusted domains and exchanges notary information with them via a secure channel. Keywords: S/MIME, security services, mail protocols, domain, notary
342

Analysing E-mail Text Authorship for Forensic Purposes

Corney, Malcolm W. January 2003 (has links)
E-mail has become the most popular Internet application and with its rise in use has come an inevitable increase in the use of e-mail for criminal purposes. It is possible for an e-mail message to be sent anonymously or through spoofed servers. Computer forensics analysts need a tool that can be used to identify the author of such e-mail messages. This thesis describes the development of such a tool using techniques from the fields of stylometry and machine learning. An author's style can be reduced to a pattern by making measurements of various stylometric features from the text. E-mail messages also contain macro-structural features that can be measured. These features together can be used with the Support Vector Machine learning algorithm to classify or attribute authorship of e-mail messages to an author providing a suitable sample of messages is available for comparison. In an investigation, the set of authors may need to be reduced from an initial large list of possible suspects. This research has trialled authorship characterisation based on sociolinguistic cohorts, such as gender and language background, as a technique for profiling the anonymous message so that the suspect list can be reduced.
343

Downtime reduction analysis of the Australia Post flat mail optical character reader

Fox, James P. January 2007 (has links)
Machine downtime, whether planned or unplanned, is intuitively costly to manufacturing organisations, but is often very difficult to quantify. The available literature showed that costing processes are rarely undertaken within manufacturing organisations. Where cost analyses have been undertaken, they generally have only valued a small proportion of the affected costs, leading to an overly conservative estimate. This thesis aimed to develop a cost of downtime model, with particular emphasis on the application of the model to Australia Post’s Flat Mail Optical Character Reader (FMOCR). The costing analysis determined a cost of downtime of $5,700,000 per annum, or an average cost of $138 per operational hour. The second section of this work focused on the use of the cost of downtime to objectively determine areas of opportunity for cost reduction on the FMOCR. This was the first time within Post that maintenance costs were considered along side of downtime for determining machine performance. Because of this, the results of the analysis revealed areas which have historically not been targeted for cost reduction. Further exploratory work was undertaken on the Flats Lift Module (FLM) and Auto Induction Station (AIS) Deceleration Belts through the comparison of the results against two additional FMOCR analysis programs. This research has demonstrated the development of a methodical and quantifiable cost of downtime for the FMOCR. This has been the first time that Post has endeavoured to examine the cost of downtime. It is also one of the very few methodologies for valuing downtime costs that has been proposed in literature. The work undertaken has also demonstrated how the cost of downtime can be incorporated into machine performance analysis with specific application to identifying high costs modules. The outcome of this report has both been the methodology for costing downtime, as well as a list of areas for cost reduction. In doing so, this thesis has outlined the two key deliverables presented at the outset of the research.
344

Hearing the voices of Filipino women: violence, media representation and contested realities

Saroca, Cleonicki January 2002 (has links)
Research Doctorate - Doctor of Philosophy (PhD) / This thesis is a feminist exploration of how violence against Filipino women in Australia is represented in the Australian and Philippine media and the relationship between the women’s lives and media images of their abuse. It is fundamentally concerned with the problem of the absent and silenced voices of Filipino women in media portrayals of violence. It aims at creating a space in which the women’s stories can be told. Based on interview data and discourse analysis of Australian and Philippine newspaper articles, the study investigates how the homicides and disappearance of seven Filipino women are represented. Case studies drawn from interviews with family members and friends of these women comprise the core of the study. An exploration of additional articles and interviews further reinforces the issues and themes that emerge in the case studies. The case studies contextualise the women’s experiences. Analysing media images in light of the interviews reinstates the absent and silenced voice in media accounts of violence. By charting the lives of these seven women, their hopes and aspirations as well as the pain and fear they suffered at the hands of abusive male partners, the case studies illuminate the way media accounts have largely misrepresented their experiences. Many of the Australian articles, in particular, bore little resemblance to the women’s lived realities. Juxtaposing Australian with Philippine portrayals further illuminates the racism and sexism of a large section of the Australian print media. A major theme to emerge out of this study is that the relationship between media image and actual violence also involves struggle and conflict over constructions of identity. It is a site of contested realities. Most of the articles analysed in this study failed to tell the story from the deceased woman’s perspective. It is argued that to hear these women's voices, journalists need to move beyond using sexist, racist and class-based stereotypes, such as mail order bride, to describe Filipino women or explain their abuse. It also means accounting for the history of domestic violence that was a large part of their lives.
345

Strafprozessuale Zugriffsmöglichkeiten auf E-Mail-Kommunikation /

Störing, Marc. January 2007 (has links)
Universiẗat, Diss., 2007--Bochum.
346

The South African media's coverage of the Abu Ghraib Prisoner abuses : an ethical case study of two selected newspapers /

Buchinger, Christine. January 2006 (has links)
Assignment (MPhil)--University of Stellenbosch, 2006. / Bibliography. Also available via the Internet.
347

Die Kontrolle der Internet- und E-Mail-Nutzung am Arbeitsplatz : unter besonderer Berücksichtigung der Vorgaben des Telekommunikationsgesetzes /

Mattl, Tina. January 2008 (has links) (PDF)
Universiẗat, Diss.--Tübingen, 2007.
348

Der Zugriff auf E-Mails im strafrechtlichen Ermittlungsverfahren /

Meininghaus, Florian. January 2007 (has links)
Zugl.: Passau, Universiẗat, Diss., 2007.
349

Beyond the schoolyard: examining electronic bullying among Canadian youth /

Stys, Yvonne, January 1900 (has links)
Thesis (M.A.)--Carleton University, 2005. / Includes bibliographical references (p. 104-113). Also available in electronic format on the Internet.
350

Email overload in academia /

Hole, Jeffrey D. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 84-90).

Page generated in 0.029 seconds