• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 186
  • 19
  • 14
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 251
  • 251
  • 251
  • 251
  • 127
  • 97
  • 53
  • 45
  • 40
  • 39
  • 32
  • 30
  • 28
  • 25
  • 25
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Efficient authentication schemes for routing in mobile ad hoc networks

Xu, Shidi. January 2006 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2006. / Typescript. Includes bibliographical references: leaf 93-102.
162

Contributions to group key distribution schemes

Kurnio, Hartono. January 2005 (has links)
Thesis (Ph.D.)--University of Wollongong, 2005. / Typescript. Includes bibliographical references: leaf 149-157.
163

Digital rights management for smart containment objects

Fares, Tony Yussef. January 2005 (has links)
Thesis (Ph.D.)--University of Wollongong, 2005. / Typescript. Includes appendices. Includes bibliographical references: leaf 201-214.
164

Advanced steganographic and steganalytic methods in the spatial domain

Soukal, David. January 2006 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Computer Science Department, 2006. / Includes bibliographical references.
165

Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs /

Ramsey, Glenn. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (p. 95-97).
166

Securing RSVP and RSVP-TE signaling protocols and their performance study /

Zhi, Jing, January 1900 (has links)
Thesis (M. Sc.)--Carleton University, 2004. / Includes bibliographical references (p. 96-101). Also available in electronic format on the Internet.
167

Coding encrypted messages into music /

Kumar, Vinay Réginald, January 1900 (has links)
Thesis (M.Sc.) - Carleton University, 2006. / Includes bibliographical references (p. 91-93). Also available in electronic format on the Internet.
168

Source authentication in group communication

Al-Ibrahim, Mohamed Hussain. January 2005 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Dept. of Computing, 2004. / Title from screen page; viewed 10 Oct 2005. Bibliography: leaves 163-175. Also available in a print form.
169

Analysis and design of cryptographic hash functions

Kasselman, Pieter Retief. January 2006 (has links)
Thesis (M.Eng.(Electronic Engineering))--University of Pretoria, 1999. / Summaries in Afrikaans and English. Includes bibliographical references.
170

Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

Kilcrease, Patrick N. January 2009 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.

Page generated in 0.1169 seconds