• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 127
  • 31
  • 16
  • 11
  • 10
  • 8
  • 8
  • 4
  • 3
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 250
  • 250
  • 138
  • 98
  • 94
  • 69
  • 46
  • 39
  • 36
  • 35
  • 35
  • 28
  • 24
  • 24
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Design and development of a web-based DOD PKI common access card (CAC) instructional tool /

Athanasopoulos, Vasileios D. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2004. / Thesis advisor(s): Cynthia E. Irvine, J.D. Fulp, Glenn R. Cook. Includes bibliographical references (p. 79-80). Also available online.
22

Secure private key management in adaptable public key infrastructures

Wiesmaier, Alexander January 2008 (has links)
Zugl.: Darmstadt, Techn. Univ., Diss., 2008
23

The secrets behind cryptography : a mathematical overview

Povondra, Amy Becker 05 January 2011 (has links)
Daily advancements in technology influence many aspects of society. In today’s political and economic era, the need for secure, computerized convenience is apparent. Cryptosystems play a major role for everyone, from an individual making an online purchase to the government communicating with an ally during wartime. As technology advances, so do cryptosystems. The author of this paper discusses different types of cryptosystems, from substitution ciphers to public key cryptography, and introduces the mathematical foundations of such systems. / text
24

Flexible certificate management in public key infrastructures

Karatsiolis, Evangelos. Unknown Date (has links) (PDF)
Darmstadt, Techn. University, Diss., 2007.
25

Sicheres Übergangsloses Roaming

Haisch, Michael. Unknown Date (has links)
Techn. Universiẗat, Diss., 2007--Darmstadt.
26

Formale Modellierung von Authentifizierungs- und Autorisierungsinfrastrukturen : Authentizität von deskriptiven Attributen und Privilegien auf der Basis digitaler Zertifikate /

Wölfl, Thomas. January 2006 (has links)
Universiẗat, Diss., 2006--Regensburg.
27

A smart card based authentication system for peer and group model

Chan, Tak-fai, Dan. January 2008 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2009. / Includes bibliographical references (p. 63-70) Also available in print.
28

An analysis of key generation efficiency of rsa cryptos ystem in distributed environments/

Çağrıcı, Gökhan. Koltuksuz, Ahmet January 2005 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2005. / Keywords: Cryptosystem, rivest-Shamir-Adleman, parallel computing, parallel algorithms, Random number. Includes bibliographical references (leaves. 68).
29

Untersuchung aktueller Sicherheitsmodelle bezüglich ihrer Eignung für den elektronischen Handel

Musleh, Jens. January 2001 (has links)
Stuttgart, Univ., Diplomarb., 2001.
30

Enhancements of the non-linear knapsack cryptosystem : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Science at the University of Canterbury /

Tu, Zhiqi. January 2006 (has links)
Thesis (M. Sc.)--University of Canterbury, 2006. / Typescript (photocopy). Includes bibliographical references (p. [93]-98). Also available via the World Wide Web.

Page generated in 0.0349 seconds