• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 79
  • 20
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 142
  • 38
  • 31
  • 29
  • 29
  • 23
  • 15
  • 14
  • 11
  • 10
  • 10
  • 10
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Die grösseren Dichtungen von James Montgomery

Wissmann, Paul, January 1914 (has links)
Thesis--Königsberg. / Vita. Includes bibliographical references (p. [7]).
2

Die grösseren Dichtungen von James Montgomery

Wissmann, Paul, January 1914 (has links)
Thesis--Königsberg. / Vita. Includes bibliographical references (p. [7]).
3

Der grosseren dichtungen von James Montgomery ...

Wissmann, Paul, January 1914 (has links)
Inaug.-diss.--Königsberg i. Pr. / Lebenslauf. "Literatur": 5th prelim. leaf.
4

Implementation of RSA Cryptosystem for Next Generation RFID Tags

Dighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
5

Implementation of RSA Cryptosystem for Next Generation RFID Tags

Dighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
6

RSA in hardware

Gillmore, Brooks Colin 21 February 2011 (has links)
This report presents the RSA encryption and decryption schemes and discusses several methods for expediting the computations required, specifically the modular exponentiation operation that is required for RSA. A hardware implementation of the CIOS (Coarsely Integrated Operand Scanning) algorithm for modular multiplication is attempted on a XILINX Spartan3 FPGA in the TLL-5000 development platform used at the University of Texas at Austin. The development of the hardware is discussed in detail and some Verilog source code is provided for an implementation of modular multiplication. Some source code is also provided for an RSA executable to run on the TLL-6219 ARM-based development platform, to be used to generate test vectors. / text
7

Implementation of RSA Cryptosystem for Next Generation RFID Tags

Dighe, Ashish Arun 29 March 2011 (has links)
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.
8

A life and its mirrors : a feminist reading of L. M. Montgomery's fiction /

Åhmansson, Gabriella, January 1991 (has links)
Doct. Thesis--Department of English--University of Uppsala--Uppsala, 1991.
9

The life and dramatic works of Robert Montgomery Bird

Foust, Clement Edgar. January 1919 (has links)
These (Ph. D.)--University of Pennsylvania. / Published also without thesis note. Bibliography: p. 161-167.
10

The natural progression of an orphan: L.M. Montgomery's Anne of Green Gables a thesis presented to the faculty of the Graduate School, Tennessee Technological University /

Jones, Amber L., January 2009 (has links)
Thesis (M.A.)--Tennessee Technological University, 2009. / Title from title page screen (viewed on Aug. 26, 2009). Bibliography: leaves 77-80.

Page generated in 0.0334 seconds