Dissertations / Theses on the topic 'And forward security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 31 dissertations / theses for your research on the topic 'And forward security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Twarog, Marek B. "Pricing security derivatives under the forward measure." Link to electronic thesis, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-053007-142223/.
Full textChow, Sze-ming Sherman. "Forward security from bilinear pairings signcryption and threshold signature /." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B30679424.
Full textChow, Sze-ming Sherman, and 周斯明. "Forward security from bilinear pairings: signcryption and threshold signature." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30679424.
Full textGo, Hiu-wing, and 吳曉頴. "Forward security and certificate management in mobile AD Hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30331080.
Full textKramer, Bryan K. "NATO and forward defense : an analysis of expeditionary capabilities and out-of-area-security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FKramer.pdf.
Full textHülsing, Andreas [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Tanja [Akademischer Betreuer] Lange. "Practical Forward Secure Signatures using Minimal Security Assumptions / Andreas Hülsing. Betreuer: Johannes Buchmann ; Tanja Lange." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2013. http://d-nb.info/1107772389/34.
Full textElsaid, Lubna A. "PHYSICAL-LAYER SECURITY WITH FULL-DUPLEX DECODE-AND-FORWARD RELAYING: SECRECY RATES AND POWER ALLOCATION." University of Akron / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=akron1467375632.
Full textEvans, Daniel T. "Making decisions about U.S.-Japan security relations : toward a limited forward-deployment in the 21st century /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA359003.
Full textMarson, Giorgia Azzurra [Verfasser], Marc [Akademischer Betreuer] Fischlin, and Martijn [Akademischer Betreuer] Stam. "Real-World Aspects of Secure Channels: Fragmentation, Causality, and Forward Security / Giorgia Azzurra Marson ; Marc Fischlin, Martijn Stam." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017. http://d-nb.info/112722543X/34.
Full textYao, Ming. "A security architecture for protecting dynamic components of mobile agents." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15913/1/Ming_Yao_Thesis.pdf.
Full textYao, Ming. "A security architecture for protecting dynamic components of mobile agents." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15913/.
Full textGarnett, Juneann. "Bridging the Gap between Agricultural Innovations and Implementation: The way Forward for Guyana." Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1429807458.
Full textAndersson, Marcus, and Alexander Nilsson. "Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3994.
Full textLee-Brown, Troy. "The Sino-Japanese security nexus: Evaluating the theoretical adequacy of exclusively applied IR theories as explanatory devices of empirical case studies and the practicability of an eclectic way forward." Thesis, Lee-Brown, Troy (2014) The Sino-Japanese security nexus: Evaluating the theoretical adequacy of exclusively applied IR theories as explanatory devices of empirical case studies and the practicability of an eclectic way forward. Masters by Coursework thesis, Murdoch University, 2014. https://researchrepository.murdoch.edu.au/id/eprint/24665/.
Full textRichter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145086.
Full textRichter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28133.
Full textGorantla, Malakondayya Choudary. "Design and analysis of group key exchange protocols." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37664/1/Malakondayya_Gorantla_Thesis.pdf.
Full textCho, Jin-Hee. "Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/29653.
Full textNohrouzian, Hossein. "An Introduction to Modern Pricing of Interest Rate Derivatives." Thesis, Mälardalens högskola, Akademin för utbildning, kultur och kommunikation, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28415.
Full textPark, DongGook. "Cryptographic protocols for third generation mobile communication systems." Thesis, Queensland University of Technology, 2001.
Find full textAlzaid, Hani Mohammed. "Secure data aggregation in wireless sensor networks." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41843/1/Hani_Alzaid_Thesis.pdf.
Full textDilag, Bayani C. "Access issues associated with U.S. Military presence in Thailand and the Philippines /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FDilag.pdf.
Full textRaphique, R., and B. Ekka. "Forward Static Program Slicing." Thesis, 2010. http://ethesis.nitrkl.ac.in/1685/1/thesis.pdf.
Full textHülsing, Andreas. "Practical Forward Secure Signatures using Minimal Security Assumptions." Phd thesis, 2013. https://tuprints.ulb.tu-darmstadt.de/3651/1/Thesis.pdf.
Full textSubhadarshini(, Sonalin. "An Identity Based Key Exchange Scheme with Perfect Forward Security." Thesis, 2015. http://ethesis.nitrkl.ac.in/7374/1/2015_BT_Sonalin_111CS0446.pdf.
Full textMohapatra, Ramesh Kumar. "Signcryption Schemes With Forward Secrecy Based on Elliptic Curve Cryptography." Thesis, 2010. http://ethesis.nitrkl.ac.in/2009/1/Thesis_rkm214.pdf.
Full textSawilla, Reginald Elias. "Ranks and Partial Cuts in Forward Hypergraphs." Thesis, 2011. http://hdl.handle.net/1974/6484.
Full textMarson, Giorgia Azzurra. "Real-World Aspects of Secure Channels: Fragmentation, Causality, and Forward Security." Phd thesis, 2017. http://tuprints.ulb.tu-darmstadt.de/6021/1/main.pdf.
Full textLiao, TeFa, and 廖德發. "A Study of Multi-Layer IP Security and Forward Error Correction Code in Wireless Network." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/43208436801281241776.
Full textDivya, Thatha. "Performance Analysis of Hybrid Decode-Amplify-Forward (HDAF) Relaying for Improving Security in Cooperative Wireless Network." Thesis, 2015. http://ethesis.nitrkl.ac.in/6822/1/Performance_DivyaT_2015.pdf.
Full textHsu, Chun-Hsiung, and 許俊雄. "The Taiwanese business people Small scaled and Security industry manufacturer Go forward The Chinese market EnterThe strategy study of relation." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/95292058355605126442.
Full text