Dissertations / Theses on the topic 'Cryptographic information security tool'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 40 dissertations / theses for your research on the topic 'Cryptographic information security tool.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.
Full textErkan, Ahmet. "An Automated Tool For Information Security Management System." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607783/index.pdf.
Full textDyer, Kevin Patrick. "Novel Cryptographic Primitives and Protocols for Censorship Resistance." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2489.
Full textPartala, J. (Juha). "Algebraic methods for cryptographic key exhange." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526207445.
Full textBesson, Loïc. "Design, analysis and implementation of cryptographic symmetric encryption algorithms on FPGA." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG104.
Full textGudlaugsson, Rúnar. "Using security protocols to extend the FiLDB architecture." Thesis, University of Skövde, Department of Computer Science, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-640.
Full textPuteaux, Pauline. "Analyse et traitement des images dans le domaine chiffré." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS119.
Full textGranlund, Henrik. "Integration of SVRS into the modelling tool GOAT." Thesis, Linköping University, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-51131.
Full textKondamudi, Harini. "Web Service for Knowledge Management Information Tool (KMIT) Hotline module and its Security." FIU Digital Commons, 2010. http://digitalcommons.fiu.edu/etd/262.
Full textRehana, Jinat. "Model Driven Development of Web Application with SPACE Method and Tool-suit." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.
Full textBengtsson, Johan, and Peter Brinck. "Design and Implementation of an Environment to Support Development of Methods for Security Assessment." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11307.
Full textPrykhodko, S. B. "Application of Nonlinear Stochastic Differential Systems for Data Protection in Audio and Graphics Files." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/41209.
Full textBista, Sulabh. "Assessing the Physical Security of IDFs with PSATool: a Case Study." Digital Commons @ East Tennessee State University, 2015. https://dc.etsu.edu/etd/2605.
Full textMarcos, Conca Alexandre. "A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272.
Full textVan, Os Rob. "SOC-CMM: Designing and Evaluating a Tool for Measurement of Capability Maturity in Security Operations Centers." Thesis, Luleå tekniska universitet, Datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59591.
Full textJohansson, Richard, and Heino Otto Engström. "Topic propagation over time in internet security conferences : Topic modeling as a tool to investigate trends for future research." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177748.
Full textAl, Awadi Wali. "An Assessment of Static and Dynamic malware analysis techniques for the android platform." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1635.
Full textSundmark, Thomas. "Improvement and Scenario-Based Evaluation of the eXtended Method for Assessment of System Security." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-16555.
Full textKubík, Pavel. "Kryptovirologie." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235983.
Full textPech, Jan. "Aplikace zákona a vyhlášky o kybernetické bezpečnosti na úřadech státní správy." Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-203989.
Full textStrachová, Zuzana. "Implementace nástroje pro řízení kybernetické bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444573.
Full textChailloux, André. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security." Thesis, Paris 11, 2011. http://www.theses.fr/2011PA112121/document.
Full textFan, Yang, Hidehiko Masuhara, Tomoyuki Aotani, Flemming Nielson, and Hanne Riis Nielson. "AspectKE*: Security aspects with program analysis for distributed systems." Universität Potsdam, 2010. http://opus.kobv.de/ubp/volltexte/2010/4136/.
Full textBrejla, Tomáš. "Návrh koncepce prevence ztráty dat." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-114106.
Full textBerrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textMahapatra, Manas. "Performance Analysis of CUDA and OpenCL by Implementation of Cryptographic Algorithms." Thesis, 2015. http://ethesis.nitrkl.ac.in/6818/1/Performance__Mahapatra_2015.pdf.
Full textPereira, Vitor Manuel Parreira. "Integrated Verification of Cryptographic Security Proofs and Implementations." Doctoral thesis, 2020. https://hdl.handle.net/10216/127089.
Full textPereira, Vitor Manuel Parreira. "Integrated Verification of Cryptographic Security Proofs and Implementations." Tese, 2020. https://hdl.handle.net/10216/127089.
Full textNag, Kaustav, and Mihir Birua. "Implementing Symmetric Cryptographic Techniques in Online fee Payment System of NIT Rourkela." Thesis, 2012. http://ethesis.nitrkl.ac.in/3534/1/thesis(108CS008%26108CS042).pdf.
Full textTong-XuanWei and 衛彤軒. "Security Analysis on Quantum Cryptographic Protocols Based on Quantum Information Theory." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/79505488113490413997.
Full textNaidu, Poluru Praveen Kumar. "Tool to exploit Heartbleed Vulnerability." Thesis, 2015. http://ethesis.nitrkl.ac.in/7200/1/Tool_Naidu_2015.pdf.
Full textLee, Yin-Fu, and 李胤府. "A Study of Designing Technical Testing Tool for Information Security Management Systems." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71408750726967001135.
Full textLin, Yu-Lung, and 林裕倫. "An Approach to Assessment Model and Metric Tool of Information Security in EIP." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/45335754014214632666.
Full textWNAG, JIUNG-SHUNG, and 王俊雄. "The Study of “Broken Authentication” Information Security Topic Training Base on Open Source Lab Tool." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/4uzy5b.
Full text"Mapping for Healthier Communities: Using GIS Technology as a Tool for Addressing Food Security." Master's thesis, 2011. http://hdl.handle.net/2286/R.I.9214.
Full text黃俊杰. "The Study of “ Insufficient Logging & Monitoring ”Information Security Topic Training Base on Open Source Lab Tool." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/d43264.
Full textBELLIZIA, DAVIDE. "Design methodologies for cryptographic hardware with countermeasures against side channel attacks." Doctoral thesis, 2018. http://hdl.handle.net/11573/1094643.
Full textEloff, Corné. "Spatial technology as a tool to analyse and combat crime." Thesis, 2006. http://hdl.handle.net/10500/1193.
Full textMolefe, Thato. "Qualitative evaluation of smallholder and organic farmer decision support tool (DST) and its improvement by inclusion of a disease management component." Thesis, 2011. http://hdl.handle.net/10413/8467.
Full text