171 |
An enhanced method for the existing bluetooth pairing protocol to avoid impersonation attacksMendoza, Patricia A., January 2009 (has links)
Thesis (M.S.)--University of Texas at El Paso, 2009. / Title from title screen. Vita. CD-ROM. Includes bibliographical references. Also available online.
|
172 |
Formally evaluating wireless security protocolsCubukcu, Ilkay. Yasinsac, Alec. January 2005 (has links)
Thesis (M.S.)--Florida State University, 2005. / Advisor: Dr. Alec Yasinsac, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 7, 2005). Document formatted into pages; contains x, 149 pages. Includes bibliographical references.
|
173 |
A novel unified algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2[superscript]n) suitable for public-key cryptography /Tawalbeh, Lo'ai. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2005. / Printout. Includes bibliographical references (leaves 57-61). Also available on the World Wide Web.
|
174 |
Implementation of a forward error correction technique using convolutional encoding with Viterbi decoding /Rawat, Sachin. January 2004 (has links)
Thesis (M.S.)--Ohio University, March, 2004. / Includes bibliographical references (p. 90-91).
|
175 |
A watermarking protocol for digital contents distribution /Curreem, Hanif. January 2002 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002. / Includes bibliographical references (leaves 65-68). Also available in electronic version. Access restricted to campus users.
|
176 |
Several variants and generalizations of Shamir's secret sharing scheme /Lai, Chun-Pong. January 2002 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002. / Includes bibliographical references (leaves 55-58). Also available in electronic version. Access restricted to campus users.
|
177 |
Towards securing networks of resource constrained devices a study of cryptographic primitives and key distribution schemes /Chan, Kevin Sean. January 2008 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009. / Committee Chair: Fekri, Faramarz; Committee Member: James McClellan; Committee Member: John Copeland; Committee Member: Steven McLaughlin; Committee Member: Yajun Mei. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
178 |
Architectural support for improving security and performance of memory sub-systemsYan, Chenyu. January 2008 (has links)
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2009. / Committee Chair: Milos Prvulovic; Committee Member: Gabriel Loh; Committee Member: Hyesoon Kim; Committee Member: Umakishore Ramachandran; Committee Member: Yan Solihin. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
179 |
Multimedia lightweight encryption via randomized entropy coding /Zhou, Jiantao. January 2009 (has links)
Thesis (Ph.D.)--Hong Kong University of Science and Technology, 2009. / Includes bibliographical references (p. 123-130).
|
180 |
Kernel methods in steganalysisPevný, Tomáš. January 2008 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Computer Science, 2008. / Includes bibliographical references.
|
Page generated in 0.1425 seconds