Dissertations / Theses on the topic 'Electronic security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Electronic security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Pao, Hua-Fu. "Security management of electronic data interchange." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA272962.
Full textZhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Full textZhao, Weiliang. "Security techniques for electronic commerce applications /." View thesis View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030505.155156/index.html.
Full textGonzález, Calabuig Andreu. "Electronic Tongues for food and security applications." Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/643301.
Full textMarais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.
Full textKhu-Smith, Vorpranee. "Enhancing the security of electronic commerce transactions." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406487.
Full textDeWitt, Alexander John Anthony George. "Usability issues with security of electronic mail." Thesis, Brunel University, 2007. http://bura.brunel.ac.uk/handle/2438/1059.
Full textCheang, Sek Lam. "Electronic commerce and security : risk identification and management." Thesis, University of Macau, 2001. http://umaclib3.umac.mo/record=b1636215.
Full textEriksson, Oskar, Kristian Maric, and Hans Olsberg. "Electronic Identification : Focus on bank services and security." Thesis, Jönköping University, Jönköping International Business School, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-62.
Full textRodrigues, Aniket. "SCADA security device: design and implementation." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5195.
Full textShah, Payal Hemchand. "Security in live Virtual Machine migration." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5205.
Full textBijani, Shahriar. "Securing open multi-agent systems governed by electronic institutions." Thesis, University of Edinburgh, 2013. http://hdl.handle.net/1842/8268.
Full textHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textPino, Luca. "Security aware service composition." Thesis, City University London, 2015. http://openaccess.city.ac.uk/13170/.
Full textHoernecke, Andrew Todd. "Security Integrated Messaging a protocol for secure electronic mail /." [Ames, Iowa : Iowa State University], 2007.
Find full textDagdelen, Özgür. "The Cryptographic Security of the German Electronic Identity Card." Phd thesis, tuprints, 2013. https://tuprints.ulb.tu-darmstadt.de/3538/7/%C3%96zg%C3%BCrDagdelen-Thesis.pdf.
Full textAkinbi, Olushola Alexander. "An adaptive security framework for evaluating and assessing security implementations in PaaS cloud models." Thesis, Edge Hill University, 2015. http://repository.edgehill.ac.uk/7762/.
Full textHof, Sonja. "Alternative security approaches in E-government /." Linz : Trauner Verlag, 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014795036&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA.
Full textTaramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.
Full textMaarof, M. A. B. "Integrating security services into computer supported cooperative work." Thesis, Aston University, 2000. http://publications.aston.ac.uk/7989/.
Full textVives, Guasch Arnau. "Contributions to the security and privacy of electronic ticketing systems." Doctoral thesis, Universitat Rovira i Virgili, 2013. http://hdl.handle.net/10803/119683.
Full textDivic, Mirela, and Ida Hveding Huse. "A Security Focused Integration Architecture for an Electronic Observation Chart." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9257.
Full textJaks, Liis. "Security Evaluation of the Electronic Control Unit Software Update Process." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188171.
Full textGlisson, William Bradley. "The Web Engineering Security (WES) methodology." Thesis, University of Glasgow, 2008. http://theses.gla.ac.uk/186/.
Full textEl, Salamouny Ehab. "Probabilistic trust models in network security." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/179163/.
Full textElsadig, Abdalla Abdalla Mohamed. "Virtualization Security Issues : Security issues arise in the virtual environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42474.
Full textShah, Anant. "Performance analysis of security mechanism during handoff in Mobile IP." Thesis, Wichita State University, 2007. http://hdl.handle.net/10057/1557.
Full textShah, Anant Pendse Ravindra. "Performance analysis of security mechanism during handoff in Mobile IP /." Thesis, A link to full text of this thesis in SOAR, 2007. http://hdl.handle.net/10057/1557.
Full textShonola, Shaibu A. "Mobile learning security in Nigeria." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/98529/.
Full textCooke, John C. "Cryptographic techniques for personal communication systems security." Thesis, Aston University, 1995. http://publications.aston.ac.uk/8234/.
Full textYe, Ruyi. "An economic model of investment in information security /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ISMT%202004%20YE.
Full textSt, Leger Aaron. "Power system security assessment through analog computation /." Click for resource, 2008. http://hdl.handle.net/1860/2815.
Full textCiobâcǎ, Ştefan. "Verification and composition of security protocols with applications to electronic voting." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2011. http://tel.archives-ouvertes.fr/tel-00661721.
Full textFlick, David Kenneth Gillum Charles Royce. "Electronic commerce : an analysis of financial transaction methods and associated security /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA333332.
Full textHussey, Phillip Ryan. "The Evolution of Electronic Surveillance: Balancing National Security and Civil Liberties." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-06152007-110824/.
Full textAldajani, Mouhamad. "Electronic patient record security policy in Saudi Arabia National Health Service." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/6016.
Full textFlick, David Kenneth, and Charles Royce Gillum. "Electronic commerce: an analysis of financial transaction methods and associated security." Thesis, Monterey, California. Naval Postgraduate School, 1996. http://hdl.handle.net/10945/32239.
Full textCiobâcǎ, Ştefan. "Verification and composition of security protocols with applications to electronic voting." Thesis, Cachan, Ecole normale supérieure, 2011. http://www.theses.fr/2011DENS0059/document.
Full textJackson, Jennifer T. "A biodiversity approach to cyber security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/106820/.
Full textKatsikas, Stamatios. "Game theoretic models of networks security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/102611/.
Full textAlAdraj, Resala A. "Security and collaborative groupware tools usage." Thesis, University of Warwick, 2015. http://wrap.warwick.ac.uk/73319/.
Full textZhang, Jun Qi, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Oblivious transfer protocols for securing electronic commerce." THESIS_CSTE_CIT_Zhang_J.xml, 2002. http://handle.uws.edu.au:8081/1959.7/289.
Full textJellen, Isabel. "Towards Security and Privacy in Networked Medical Devices and Electronic Healthcare Systems." DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2141.
Full textDu, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Full textDiepenbrock, Robert G. "Safety and security concerns: perceptions of preparedness of a rural school district." Diss., Wichita State University, 2010. http://hdl.handle.net/10057/3648.
Full textJareen, Tania. "Improving performance, power, and security of multicore systems using smart cache organization." Thesis, Wichita State University, 2014. http://hdl.handle.net/10057/10964.
Full textKim, Kamyoung. "Spatial analytical approaches for supporting security monitoring." Columbus, Ohio : Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1186593136.
Full textYu, Kin-ying, and 余見英. "Long term preservation of electronic documents." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30073200.
Full textThulnoon, A. A. T. "Efficient runtime security system for decentralised distributed systems." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9043/.
Full textZhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce /." View thesis View thesis, 2002. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030417.113506/index.html.
Full text