Dissertations / Theses on the topic 'Cryptography – Research'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 20 dissertations / theses for your research on the topic 'Cryptography – Research.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Mefford, Greg. "Side Channel Analysis Research Framework (SCARF)." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342463791.
Full textMeihong, Li, Zhang Qishan, and Wang Jun. "RESEARCH AND IMPLEMENTATION OF MOBILE BANK BASED ON SSL." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605837.
Full textDeligne, Eddy. "Hyperviseur de protection d'exécutables - Etude, développement et discussion." Phd thesis, Ecole Polytechnique X, 2014. http://pastel.archives-ouvertes.fr/pastel-00976713.
Full textMoulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.
Full textGutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.
Full textPfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145096.
Full textPfennig, Stefan, and Elke Franz. "Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency." Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28134.
Full textDyer, Kevin Patrick. "Novel Cryptographic Primitives and Protocols for Censorship Resistance." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2489.
Full textChaffe, Tomas. "The Secret Writer." Thesis, Konstfack, Institutionen för Konst (K), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:konstfack:diva-3980.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textLin, Shin-Guo, and 林新國. "Research of Multi-Secret Sharing Using Visual Cryptography." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/10396132706705115003.
Full textLin, Yiming, and 林易民. "A Research of Visual Cryptography on XML Platform." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/60790336399281330368.
Full text朱秋香. "A Research on Visual Cryptography Model for Protecting Grey-Level Images." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/92334265187823882070.
Full textHsu, Hsiao Pin, and 許筱萍. "The Type of Camouflaged Style in Spatial Research - Focused on the Cryptography." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/10723723534685664576.
Full textLing, Jie. "Smart card fault attacks on public key and elliptic curve cryptography." Thesis, 2014. http://hdl.handle.net/1805/5967.
Full textSheriff, Ray E. "The 2013 Electronics and Telecommunications Research Seminar Series: 12th Workshop Proceeedings." 2013. http://hdl.handle.net/10454/5560.
Full textYu, Min-Chieh. "A secure mobile agent e-commerce protocol." Thesis, 2015. http://hdl.handle.net/1805/10117.
Full textHung, Ying-Hao, and 洪英豪. "A Research on Certificateless Cryptographic Schemes." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/ckcje9.
Full textLi, Yuan-Fu, and 李元輔. "A research on security analyses of cryptographic protocols." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/rcwytw.
Full textRangwala, Mohammed M. "Secure Digital Provenance: Challenges and a New Design." Thesis, 2014. http://hdl.handle.net/1805/6051.
Full text