161 |
Efficient authentication schemes for routing in mobile ad hoc networksXu, Shidi. January 2006 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2006. / Typescript. Includes bibliographical references: leaf 93-102.
|
162 |
Contributions to group key distribution schemesKurnio, Hartono. January 2005 (has links)
Thesis (Ph.D.)--University of Wollongong, 2005. / Typescript. Includes bibliographical references: leaf 149-157.
|
163 |
Digital rights management for smart containment objectsFares, Tony Yussef. January 2005 (has links)
Thesis (Ph.D.)--University of Wollongong, 2005. / Typescript. Includes appendices. Includes bibliographical references: leaf 201-214.
|
164 |
Advanced steganographic and steganalytic methods in the spatial domainSoukal, David. January 2006 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Computer Science Department, 2006. / Includes bibliographical references.
|
165 |
Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs /Ramsey, Glenn. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (p. 95-97).
|
166 |
Securing RSVP and RSVP-TE signaling protocols and their performance study /Zhi, Jing, January 1900 (has links)
Thesis (M. Sc.)--Carleton University, 2004. / Includes bibliographical references (p. 96-101). Also available in electronic format on the Internet.
|
167 |
Coding encrypted messages into music /Kumar, Vinay Réginald, January 1900 (has links)
Thesis (M.Sc.) - Carleton University, 2006. / Includes bibliographical references (p. 91-93). Also available in electronic format on the Internet.
|
168 |
Source authentication in group communicationAl-Ibrahim, Mohamed Hussain. January 2005 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Dept. of Computing, 2004. / Title from screen page; viewed 10 Oct 2005. Bibliography: leaves 163-175. Also available in a print form.
|
169 |
Analysis and design of cryptographic hash functionsKasselman, Pieter Retief. January 2006 (has links)
Thesis (M.Eng.(Electronic Engineering))--University of Pretoria, 1999. / Summaries in Afrikaans and English. Includes bibliographical references.
|
170 |
Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basisKilcrease, Patrick N. January 2009 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.
|
Page generated in 0.1169 seconds