81 |
Secure public instant messaging /Mannan, Mohammad Abdul, January 1900 (has links)
Thesis (M.C.S.) Carleton University, 2005. / Includes bibliographical references (p. 106-121). Also available in electronic format on the Internet.
|
82 |
Synchronization of chaotic circuits through real channels /Barnes, Wayne. January 1994 (has links)
Report (M.S.)--Virginia Polytechnic Institute and State University, 1994. / Abstract. Includes bibliographical references (leaf 32). Also available via the Internet.
|
83 |
Investigation into the impacts of migration to emergent NSA Suite B encryption standardsVenema, Jacob Paul. Shu, Jonathan Lee Yee. January 2009 (has links) (PDF)
Thesis (M.S. in Systems Technology (Command, Control & Communications (C3)))--Naval Postgraduate School, June 2009 by Jacob P. Venema. Thesis (M.S. in Software Engineering)--Naval Postgraduate School, June 2009 by Jonahan Lee Yee Shu. / Thesis Advisor(s): Fulp, John D. ; Riehle, Richard. "June 2009." Description based on title screen as viewed on July 14, 2009. Author(s) subject terms: elliptical curve cryptography, ECC, Rivest Shamir and Adleman, RSA, NSA Suite B, encryption, digital signature, key agreement, ECC migration, risk mitigation. Includes bibliographical references (p. 95-98). Also available in print.
|
84 |
Designing authenication scheme for wireless sensor networksWang, Ke, January 2009 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2009. / Includes bibliographical references (leaves 85-101). Also available in print.
|
85 |
Security in serverless network environments /Holtje, Carl. January 2004 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2004. / Typescript. Includes bibliographical references (p. [113]-115).
|
86 |
Hardware encryption using the MPC180 security co-processor /Banerjee, Uday. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2004. / Printout. Includes bibliographical references (leaves 59-60). Also available on the World Wide Web.
|
87 |
The design of a test environment and its use in verification of a scalable modular multiplication and exponentiation /Khair, Elias. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2004. / Typescript (photocopy). Includes bibliographical references (leaves 53-54). Also available on the World Wide Web.
|
88 |
Secure distribution of open source information /Rogers, Jason Lee. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004. / Thesis advisor(s): George Dinolt. Includes bibliographical references (p. 57-59). Also available online.
|
89 |
Xor based optical encryption with noise performance modeling and application to image transmission over wireless IP lan /Zhang, Bo. January 1900 (has links)
Thesis (MTech (Information Technology))--Peninsula Technikon, 2004. / Word processed copy. Summary in English. Includes bibliographical references (leaves 117-120). Also available online.
|
90 |
The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments /Salles, Ernesto J. January 2002 (has links) (PDF)
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, September 2002. / Thesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
|
Page generated in 0.1312 seconds