Dissertations / Theses on the topic 'Encrypted'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Encrypted.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Rosén, Oskar. "Encrypted Chat Client : Encrypted communication over XMPP." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177499.
Full textBrekne, Tønnes. "Encrypted Computation." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27.
Full textMoataz, Tarik. "Searching over encrypted data." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0418/document.
Full textBrinkman, Richard. "Searching in encrypted data." Enschede : University of Twente [Host], 2007. http://doc.utwente.nl/57878.
Full textReid, Eric. "ENCRYPTED CORRELATING SOURCE SELECTOR." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604265.
Full textTran, Augustin. "Encrypted Collaborative Editing Software." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1703311/.
Full textIzadinia, Vafa Dario. "Fingerprinting Encrypted Tunnel Endpoints." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.
Full textRamkumar, Bhuvaneswari. "Encrypted mal-ware detection." [Ames, Iowa : Iowa State University], 2008.
Find full textGuadiana, Juan M., and Fil Macias. "ENCRYPTED BIT ERROR RATE TESTING." International Foundation for Telemetering, 2002. http://hdl.handle.net/10150/607507.
Full textDeng, Mo Ph D. Massachusetts Institute of Technology. "On compression of encrypted data." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106100.
Full textJesu, Alberto. "Reinforcement learning over encrypted data." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23257/.
Full textXia, Ying Han. "Establishing trust in encrypted programs." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24761.
Full textChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases." online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Full textThomas, Nithin. "Transcoding architectures for encrypted digital video." Thesis, University of Bristol, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504231.
Full textGuadiana, Juan M. "Best Source Selection on Encrypted Data." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604139.
Full textDuffy, Harold A. "Merging of Diverse Encrypted PCM Streams." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/611392.
Full textSvensson, Carolin. "Anomaly Detection in Encrypted WLAN Traffic." Thesis, Linköpings universitet, Kommunikationssystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-172689.
Full textDahanayaka, Thilini Nimeshika. "Analytics over Encrypted Traffic and Defenses." Thesis, The University of Sydney, 2023. https://hdl.handle.net/2123/29932.
Full textGoh, Vik Tor. "Intrusion detection framework for encrypted networks." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.
Full textBernagozzi, Stefano. "Range Queries on an encrypted outsourced database." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Full textLella, Tuneesh Kumar. "Privacy of encrypted Voice Over Internet Protocol." Thesis, Texas A&M University, 2008. http://hdl.handle.net/1969.1/86009.
Full textMalhotra, Paras. "Detection of encrypted streams for egress monitoring." [Ames, Iowa : Iowa State University], 2007.
Find full textZhang, Ye, and 张叶. "Query and access control over encrypted databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Full textTahir, Shahzaib. "Privacy preserving search in large encrypted databases." Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/21592/.
Full textGrinman, Alex J. "Natural language processing on encrypted patient data." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113438.
Full textWampler, Christopher. "Information leakage in encrypted IP video traffic." Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/54287.
Full textFernández, Javier, Sabrina Kirrane, Axel Polleres, and Simon Steyskal. "Self-Enforcing Access Control for Encrypted RDF." Springer International Publishing AG, 2017. http://dx.doi.org/10.1007/978-3-319-58068-5_37.
Full textWang, Bing. "Search over Encrypted Data in Cloud Computing." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/71466.
Full textWhite, Matthew L. "Defeating ROP Through Dynamically Encrypted Return Addresses." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1393237185.
Full textWang, Boyang, and Boyang Wang. "Secure Geometric Search on Encrypted Spatial Data." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625567.
Full textYi, Shuang. "Reversible data hiding technologies for encrypted images." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3951604.
Full textRantos, Konstantinos. "Key recovery in a business environment." Thesis, Royal Holloway, University of London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.248051.
Full textJames, Jesse Edward. "Intelligent sensing of encrypted packets in wireless networks." Diss., Connect to online resource, 2005. http://wwwlib.umi.com/cr/colorado/fullcit?p1430192.
Full textPopa, Raluca Ada. "Building practical systems that compute on encrypted data." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/93830.
Full textNg, Wai-Hung. "A Time-Variant Approach for Encrypted Digital Communications." International Foundation for Telemetering, 1989. http://hdl.handle.net/10150/614624.
Full textStein, David Benjamin. "Efficient homomorphically encrypted privacy-preserving automated biometric classification." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/130608.
Full textLu, Yuanchao. "On Traffic Analysis Attacks To Encrypted VoIP Calls." Cleveland State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=csu1260222271.
Full textRicci, Sara. "Outsourcing Computation on Non-Encrypted SensitiveData to Untrusted Clouds." Doctoral thesis, Universitat Rovira i Virgili, 2018. http://hdl.handle.net/10803/586261.
Full textGastaud, Gallagher Nicolas Hugh René. "Multi-Gigahertz Encrypted Communication Using Electro-Optical Chaos Cryptography." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19701.
Full textApplin, Joanne Louise. "The encrypted object : the secret world of sixties sculpture." Thesis, University College London (University of London), 2004. http://discovery.ucl.ac.uk/1446476/.
Full textLagerhjelm, Linus. "Extracting Information from Encrypted Data using Deep Neural Networks." Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-155904.
Full textJoshi, Manasi. "On Reverse Engineering of Encrypted High Level Synthesis Designs." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535466997060049.
Full textKennedy, Sean M. "Encrypted Traffic Analysis on Smart Speakers with Deep Learning." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1562923491454974.
Full textWoodworth, Jason W. "Secure Semantic Search over Encrypted Big Data in the Cloud." Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10286646.
Full textWiesberg, Angela [Verfasser], and Frederik [Akademischer Betreuer] Armknecht. "Machine learning on encrypted data / Angela Wiesberg ; Betreuer: Frederik Armknecht." Mannheim : Universitätsbibliothek Mannheim, 2018. http://d-nb.info/1169572448/34.
Full textFletcher, Christopher W. (Christopher Wardlaw). "Ascend : an architecture for performing secure computation on encrypted data." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82387.
Full textShah, Meelap (Meelap Vijay). "PARTE : automatic program partitioning for efficient computation over encrypted data." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79239.
Full textAreström, Erik. "Flow Classification of Encrypted Traffic Streams using Multi-fractal Features." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148725.
Full textFischer, Andreas [Verfasser]. "Computing on encrypted data using trusted execution environments / Andreas Fischer." Paderborn : Universitätsbibliothek, 2021. http://d-nb.info/1234058790/34.
Full textRandall, James P. "Posthumous temporality and encrypted historical time in fiction and life writing." Thesis, Goldsmiths College (University of London), 2018. http://research.gold.ac.uk/23276/.
Full text