Spelling suggestions: "subject:"encryption."" "subject:"ancryption.""
201 |
Investigation into the impacts of migration to emergent NSA Suite B encryption standardsVenema, Jacob Paul. Shu, Jonathan Lee Yee. January 2009 (has links) (PDF)
Thesis (M.S. in Systems Technology (Command, Control & Communications (C3)))--Naval Postgraduate School, June 2009 by Jacob P. Venema. Thesis (M.S. in Software Engineering)--Naval Postgraduate School, June 2009 by Jonahan Lee Yee Shu. / Thesis Advisor(s): Fulp, John D. ; Riehle, Richard. "June 2009." Description based on title screen as viewed on July 14, 2009. Author(s) subject terms: elliptical curve cryptography, ECC, Rivest Shamir and Adleman, RSA, NSA Suite B, encryption, digital signature, key agreement, ECC migration, risk mitigation. Includes bibliographical references (p. 95-98). Also available in print.
|
202 |
Designing authenication scheme for wireless sensor networksWang, Ke, January 2009 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2009. / Includes bibliographical references (leaves 85-101). Also available in print.
|
203 |
Security in serverless network environments /Holtje, Carl. January 2004 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2004. / Typescript. Includes bibliographical references (p. [113]-115).
|
204 |
Hardware encryption using the MPC180 security co-processor /Banerjee, Uday. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2004. / Printout. Includes bibliographical references (leaves 59-60). Also available on the World Wide Web.
|
205 |
The design of a test environment and its use in verification of a scalable modular multiplication and exponentiation /Khair, Elias. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2004. / Typescript (photocopy). Includes bibliographical references (leaves 53-54). Also available on the World Wide Web.
|
206 |
Secure distribution of open source information /Rogers, Jason Lee. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004. / Thesis advisor(s): George Dinolt. Includes bibliographical references (p. 57-59). Also available online.
|
207 |
Xor based optical encryption with noise performance modeling and application to image transmission over wireless IP lan /Zhang, Bo. January 1900 (has links)
Thesis (MTech (Information Technology))--Peninsula Technikon, 2004. / Word processed copy. Summary in English. Includes bibliographical references (leaves 117-120). Also available online.
|
208 |
The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments /Salles, Ernesto J. January 2002 (has links) (PDF)
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, September 2002. / Thesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
|
209 |
A lightweight key distribution mechanism for wireless sensor networksCompton-Drake, Lynsey Elizabeth. January 2009 (has links) (PDF)
Thesis (M.S. in computer engineering)--Washington State University, May 2009. / Title from PDF title page (viewed on Aug. 5, 2009). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 29-31).
|
210 |
Cube attacks on cryptographic hash functions /Lathrop, Joel. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 62-65).
|
Page generated in 0.0793 seconds