• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 53
  • 9
  • 8
  • 7
  • 6
  • 5
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 120
  • 26
  • 26
  • 25
  • 24
  • 24
  • 18
  • 16
  • 15
  • 13
  • 11
  • 10
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

A critical old-spelling edition of Nahum Tate's Brutus of Alba

Tate, Nahum, Craven, Robert R. January 1987 (has links)
Robert Russell Craven's Thesis (doctoral)--University of Rhode Island, 1976. / Includes bibliographical references (p. 239-250).
32

Leomarte: Sumas de historia troyana

Leomarte. Rey, Agapito, January 1932 (has links)
Thesis--University of Wisconsin. / At head of title: Junta para ampliación de estudios.--Centro de estudios históricos. "El texto de las Sumas de Leomarte, que hoy editamos por primera vez, se conserva en dos manuscritos, ambos de la Biblioteca nacional de Madrid ... manuscrito 9256 (antiguo Bb-100) ... [y] manuscrito 6419 (antiguo S-30)." Without thesis note. "Bibliografia": p. 51-55. "Obras utilizadas en el vocabulario": p.56-57.
33

Token-based Graphical Password Authentication

Gyorffy, John Unknown Date
No description available.
34

Token-based Graphical Password Authentication

Gyorffy, John 11 1900 (has links)
Given that phishing is an ever increasing problem, a better authentication system than the current alphanumeric system is needed. Because of the large number of current authentication systems that use alphanumeric passwords, a new solution should be compatible with these systems. We propose a system that uses a graphical password deployed from a Trojan and virus resistant embedded device as a possible solution. The graphical password would require the user to choose a family photo sized to 441x331 pixels. Using this image, a novel, image hash provides an input into a cryptosystem on the embedded device that subsequently returns an encryption key or text password. The graphical password requires the user to click five to eight points on the image. From these click-points, the embedded device stretches the graphical password input to a 32- character, random, unique alphanumeric password or a 256-bit AES key. Each embedded device and image are unique components in the graphical password system. Additionally, one graphical password can generate many 32-character unique, alphanumeric passwords using its embedded device which eliminates the need for the user to memorize many passwords. / Computer Engineering
35

A Study of Quintus of Smyrna /

Paschal, George Washington, January 1904 (has links)
Thesis (Ph. D.)--University of Chicago, 1900. / Includes bibliographical references (p. 7-10). Also available on the Internet.
36

A critical old-spelling edition of Nahum Tate's Brutus of Alba

Tate, Nahum, Craven, Robert R. January 1987 (has links)
Robert Russell Craven's Thesis (doctoral)--University of Rhode Island, 1976. / Includes bibliographical references (p. 239-250).
37

Hardware Security and Side Channel Power Analysis for 16X16 Booth Multiplier in 65nm CMOS Technology

Vissamsetty, Kanchan 30 August 2021 (has links)
No description available.
38

Malware: Det moderna hotet mot företag

Karlsson, Oliver, Magnusson, Erik January 2021 (has links)
I denna uppsats granskas de vanligast förekommande typerna av malware, derasfunktioner samt de konsekvenser som förekommer vid angrepp. Konsekvenser innebär skador vid stöld eller förstörelse av data, som finns på den drabbade enheten. Syftet med denna uppsats är att ge en överblick av de nuvarande största hoten för företag med Windowsdatorer när det kommer till malware. En litteraturstudie användes för att framställa vilka de vanligaste typerna av malware är, hur de valda typerna av malware delas in och deras funktion. I arbetet genomförs även ett experiment för att utläsa mer exakt hur vissa malware opererar när de infekterar ett operativsystem. Informationen som utvunnits av experimentet kombinerades med informationen från litteraturstudien och har sammanställts i denna rapport. I diskussionen tas de olika konsekvenserna upp i mer detalj samt med exempel på hur de skiljer sig åt när de påverkar ett företag. Informationen utvunnen från experimentet diskuteras, vilken typ av malware de definieras som samt vad de ändrade i systemet. I slutsatsen visas de vanligaste typerna av malware i en tabell med hänsyn till både konsekvenserna samt sannolikheten. Effekterna av programvaran diskuteras också och några exempel tas upp.
39

Kingship, Fatherhood, and the Abdication of History in Chaucer's Troilus and Criseyde

Zimmerman, Harold C. 01 January 2014 (has links)
While Chaucer's Troilus and Criseyde is not, strictly speaking, a translation, it is heavily indebted both to the medieval understanding of Trojan historiography and to Boccacio's handling of the romance of Troiolo and Criseida in his Filostrado. While Chaucer was a capable translator with respect and fondness for Boccaccio's text, he was also a confident innovator who was quite willing to modify, append, or totally change the text whenever the needs of his particular narrative warrant it. One such site of this deliberate alteration is in the handling of the character of Priam, King of Troy. While Chaucer includes every passage in which Boccaccio mentions Priam, he consistently modifies the phrasing or situation in order to downplay the king's political role, emphasizing instead his interpersonal or familial bonds. Furthermore, the material that Chaucer adds concerning Priam expands the changes made in translation, furthering a move away from the social and political and toward the personal and the individual. This example, one of many, indicates that Chaucer's Troilus and Criseyde is a work constructed around history that tries to suppress the political and historical, attempting instead to interpret events and characters in terms of their most immediate, personal settings or, when pressed, by eternal truths such as Love or Fortune. Such a focus allows us to see the "depth" of the individual or the philosophical foundations of their faith while attempting to deny the political and ideological construction of this subjectivity and belief.
40

Hardware Trojans in FPGA Device IP: Solutions Through Evolutionary Computation

Collins, Zachary 09 July 2019 (has links)
No description available.

Page generated in 0.0304 seconds