Dissertationen zum Thema „Encryption techniques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Encryption techniques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Der volle Inhalt der QuelleDutta, Saurabh. "Approach towards development of efficient encryption techniques." Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.
Der volle Inhalt der QuelleKasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.
Der volle Inhalt der QuelleTalhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms." Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.
Der volle Inhalt der QuelleChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Der volle Inhalt der QuelleJha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Der volle Inhalt der QuelleWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Der volle Inhalt der QuelleBrisbane, Gareth Charles Beattie. "On information hiding techniques for digital images." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.
Der volle Inhalt der QuelleGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Der volle Inhalt der QuelleZhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Der volle Inhalt der QuelleZabransky, Douglas Milton. "Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.
Der volle Inhalt der QuelleShin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.
Der volle Inhalt der QuelleRaghuraman, Shashank. "Efficiency of Logic Minimization Techniques for Cryptographic Hardware Implementation." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/91462.
Der volle Inhalt der QuelleBian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.
Der volle Inhalt der QuelleZhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.
Der volle Inhalt der QuelleKandi, Jayavardhan R. "Embedded Cryptography: An Analysis and Evaluation of Performance and Code Optimization Techniques for Encryption and Decryption in Embedded Systems." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000151.
Der volle Inhalt der QuelleZhao, Weiliang. "Security techniques for electronic commerce applications." Thesis, View thesis View thesis, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Der volle Inhalt der QuelleRangasamy, Jothi Ramalingam. "Cryptographic techniques for managing computational effort." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61007/1/Jothi_Rangasamy_Thesis.pdf.
Der volle Inhalt der QuelleCherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage." Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Der volle Inhalt der QuelleFernandez, Irma Becerra. "Encryption-based security for public networks : technique and application." FIU Digital Commons, 1994. http://digitalcommons.fiu.edu/etd/3296.
Der volle Inhalt der QuelleLowenrud, Richard, and Jacob Kimblad. "Implementation and Evaluation of Espresso Stream Cipher in 65nm CMOS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204620.
Der volle Inhalt der QuelleMadhavarapu, Venkata Praveen Kumar. "A Novel Three Phase Symmetric Cipher Technique." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/theses/2031.
Der volle Inhalt der QuelleКучма, Олександр Русланович, та Oleksandr Kuchma. "Розроблення модуля забезпечення приховування даних на основі стеганографічного методу найменш значущого біту". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36794.
Der volle Inhalt der QuelleLampe, Rodolphe. "Preuves de sécurité en cryptographie symétrique à l'aide de la technique du coupling." Thesis, Versailles-St Quentin en Yvelines, 2014. http://www.theses.fr/2014VERS0026/document.
Der volle Inhalt der QuelleRawat, Sachin. "Implementation of a Forward Error Correction Technique using Convolutional Encoding with Viterbi Decoding." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088439298.
Der volle Inhalt der QuelleArasteh, Davoud. "Computational Intelligence and Complexity Measures for Chaotic Information Processing." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/834.
Der volle Inhalt der QuelleLewko, Allison Bishop. "Functional encryption : new proof techniques and advancing capabilities." Thesis, 2012. http://hdl.handle.net/2152/ETD-UT-2012-05-5374.
Der volle Inhalt der QuelleYE, WEN-XIN, and 葉文心. "The application of encryption techniques on disk software protection." Thesis, 1988. http://ndltd.ncl.edu.tw/handle/09830498195289733161.
Der volle Inhalt der QuelleTsai, Chao-Jen, and 蔡釗仁. "Some Techniques for Enhancing Joint Compression and Encryption Schemes." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/bzb2tq.
Der volle Inhalt der QuelleYang, Zi-Wei, and 楊孜薇. "Blockchain Security Enhancement Based On Biometric Encryption and Computer Vision Techniques." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/48frya.
Der volle Inhalt der QuelleHsu, Chih-Chung, and 許志仲. "Studies of Improving Coding Performance and Encryption in Various Image Compression Techniques." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/65461867732062157625.
Der volle Inhalt der QuelleNishchal, Naveen Kumar. "Investigation on optical image encryption using fourier and fractional fourier domain techniques." Thesis, 2004. http://localhost:8080/iit/handle/2074/4226.
Der volle Inhalt der QuelleVerma, Gaurav. "Development of optoelectronic techniques for recognition and encryption in biometric based security systems." Thesis, 2017. http://localhost:8080/iit/handle/2074/7285.
Der volle Inhalt der Quelle(5930405), Jongho Won. "Security techniques for drones." Thesis, 2019.
Den vollen Inhalt der Quelle findenTawalbeh, Lo'ai. "Radix-4 ASIC design of a scalable Montgomery modular multiplier using encoding techniques." Thesis, 2002. http://hdl.handle.net/1957/32149.
Der volle Inhalt der Quelle(6565679), Fang-Yu Rao. "Privacy-Enhancing Techniques for Data Analytics." Thesis, 2019.
Den vollen Inhalt der Quelle finden"Investigations on encryption techniques for colored and gray scale images in fourier- and fractional fourier domains." Thesis, 2009. http://localhost:8080/xmlui/handle/12345678/4551.
Der volle Inhalt der QuelleSharma, Vikram. "Informatic techniques for continuous varible quantum key distribution." Phd thesis, 2007. http://hdl.handle.net/1885/150269.
Der volle Inhalt der QuelleOwuor, Dennis Luke. "Chaos-based secure communication and systems design." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000513.
Der volle Inhalt der QuelleSachan, Apurva. "Implementation of homomorphic encryption technique." Thesis, 2014. http://ethesis.nitrkl.ac.in/6436/1/E-71.pdf.
Der volle Inhalt der QuelleTseng, Der-Chang, and 曾德樟. "Speech Encryption Systems Based on OFDM Technique." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/87022474937383275401.
Der volle Inhalt der QuelleChen, Ji-Tian, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57512107312564452704.
Der volle Inhalt der QuelleChen, Jyi-Tyan, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/97623494837361984539.
Der volle Inhalt der QuelleLee, Ping-Yi, and 李秉奕. "Vectors Using Sparse Approximation Algorithm for Data Transmission Encryption Technique." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/63277976834531500274.
Der volle Inhalt der QuelleMa, Yun-Chi, and 馬雲麒. "The Research on Digital Holographic 3-D Object Encryption and Decryption Technique." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/95239705927600267631.
Der volle Inhalt der QuelleZHUANG, YONG-CHOU, and 莊永圳. "Applying signature and encryption technique to electronic mails and its VLSI implementation." Thesis, 1989. http://ndltd.ncl.edu.tw/handle/07644680198754296396.
Der volle Inhalt der Quelle陳宜妙. "A video encryption and decryption technique using variable length coding and randomized bit-insertion." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/02682408071006153021.
Der volle Inhalt der QuelleWu, Wen-Ho, and 吳文和. "The Study of Microoptic Elements and Moiré Technique Applying in Optical Encryption and Stereoscopic Image." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/6n52cz.
Der volle Inhalt der QuelleLin, Chiun-Chau, and 林群超. "A New VoIP Technique Combining Speech Data Encryption/G.729 Error Recovery and Its Integration with a Networked-Based Video/Speech Surveillance System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/00609153343994637179.
Der volle Inhalt der QuelleLin, Chun-Fang, and 林椿芳. "Research and Implementation of E-Voting System with IC Cards and ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/37609861755636278972.
Der volle Inhalt der Quelle