Dissertations / Theses on the topic 'Encryption techniques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Encryption techniques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Wang, Yongsheng. "Advanced video encryption techniques." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602966.
Full textDutta, Saurabh. "Approach towards development of efficient encryption techniques." Thesis, University of North Bengal, 2004. http://hdl.handle.net/123456789/26.
Full textKasarabada, Yasaswy V. "Efficient Logic Encryption Techniques for Sequential Circuits." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613752483402656.
Full textTalhah, Saad. "Advanced Encryption Techniques using New Mersenne Number Transforms." Thesis, University of Leeds, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.515408.
Full textChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Full textChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Full textJha, Pawan Kumar. "AN APPROACH TOWARDS DESIGN AND IMPLEMENTATION OF SYMMETRIC ENCRYPTION TECHNIQUES." Thesis, University of North Bengal, 2006. http://hdl.handle.net/123456789/11.
Full textWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Full textBrisbane, Gareth Charles Beattie. "On information hiding techniques for digital images." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050221.122028/index.html.
Full textGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Full textZhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Full textZabransky, Douglas Milton. "Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.
Full textShin, Dong Il. "Improving trust and securing data accessibility for e-health decision making by using data encryption techniques." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/50636/1/Dong_Il_Shin_Thesis.pdf.
Full textRaghuraman, Shashank. "Efficiency of Logic Minimization Techniques for Cryptographic Hardware Implementation." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/91462.
Full textBian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.
Full textZhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.
Full textKandi, Jayavardhan R. "Embedded Cryptography: An Analysis and Evaluation of Performance and Code Optimization Techniques for Encryption and Decryption in Embedded Systems." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000151.
Full textZhao, Weiliang. "Security techniques for electronic commerce applications." Thesis, View thesis View thesis, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Full textBozdemir, Beyza. "Privacy-preserving machine learning techniques." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS323.
Full textRangasamy, Jothi Ramalingam. "Cryptographic techniques for managing computational effort." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61007/1/Jothi_Rangasamy_Thesis.pdf.
Full textCherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage." Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Full textFernandez, Irma Becerra. "Encryption-based security for public networks : technique and application." FIU Digital Commons, 1994. http://digitalcommons.fiu.edu/etd/3296.
Full textLowenrud, Richard, and Jacob Kimblad. "Implementation and Evaluation of Espresso Stream Cipher in 65nm CMOS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204620.
Full textMadhavarapu, Venkata Praveen Kumar. "A Novel Three Phase Symmetric Cipher Technique." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/theses/2031.
Full textКучма, Олександр Русланович, та Oleksandr Kuchma. "Розроблення модуля забезпечення приховування даних на основі стеганографічного методу найменш значущого біту". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36794.
Full textLampe, Rodolphe. "Preuves de sécurité en cryptographie symétrique à l'aide de la technique du coupling." Thesis, Versailles-St Quentin en Yvelines, 2014. http://www.theses.fr/2014VERS0026/document.
Full textRawat, Sachin. "Implementation of a Forward Error Correction Technique using Convolutional Encoding with Viterbi Decoding." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088439298.
Full textArasteh, Davoud. "Computational Intelligence and Complexity Measures for Chaotic Information Processing." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/834.
Full textLewko, Allison Bishop. "Functional encryption : new proof techniques and advancing capabilities." Thesis, 2012. http://hdl.handle.net/2152/ETD-UT-2012-05-5374.
Full textYE, WEN-XIN, and 葉文心. "The application of encryption techniques on disk software protection." Thesis, 1988. http://ndltd.ncl.edu.tw/handle/09830498195289733161.
Full textTsai, Chao-Jen, and 蔡釗仁. "Some Techniques for Enhancing Joint Compression and Encryption Schemes." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/bzb2tq.
Full textYang, Zi-Wei, and 楊孜薇. "Blockchain Security Enhancement Based On Biometric Encryption and Computer Vision Techniques." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/48frya.
Full textHsu, Chih-Chung, and 許志仲. "Studies of Improving Coding Performance and Encryption in Various Image Compression Techniques." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/65461867732062157625.
Full textNishchal, Naveen Kumar. "Investigation on optical image encryption using fourier and fractional fourier domain techniques." Thesis, 2004. http://localhost:8080/iit/handle/2074/4226.
Full textVerma, Gaurav. "Development of optoelectronic techniques for recognition and encryption in biometric based security systems." Thesis, 2017. http://localhost:8080/iit/handle/2074/7285.
Full text(5930405), Jongho Won. "Security techniques for drones." Thesis, 2019.
Find full textTawalbeh, Lo'ai. "Radix-4 ASIC design of a scalable Montgomery modular multiplier using encoding techniques." Thesis, 2002. http://hdl.handle.net/1957/32149.
Full text(6565679), Fang-Yu Rao. "Privacy-Enhancing Techniques for Data Analytics." Thesis, 2019.
Find full text"Investigations on encryption techniques for colored and gray scale images in fourier- and fractional fourier domains." Thesis, 2009. http://localhost:8080/xmlui/handle/12345678/4551.
Full textSharma, Vikram. "Informatic techniques for continuous varible quantum key distribution." Phd thesis, 2007. http://hdl.handle.net/1885/150269.
Full textOwuor, Dennis Luke. "Chaos-based secure communication and systems design." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000513.
Full textSachan, Apurva. "Implementation of homomorphic encryption technique." Thesis, 2014. http://ethesis.nitrkl.ac.in/6436/1/E-71.pdf.
Full textTseng, Der-Chang, and 曾德樟. "Speech Encryption Systems Based on OFDM Technique." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/87022474937383275401.
Full textChen, Ji-Tian, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57512107312564452704.
Full textChen, Jyi-Tyan, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/97623494837361984539.
Full textLee, Ping-Yi, and 李秉奕. "Vectors Using Sparse Approximation Algorithm for Data Transmission Encryption Technique." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/63277976834531500274.
Full textMa, Yun-Chi, and 馬雲麒. "The Research on Digital Holographic 3-D Object Encryption and Decryption Technique." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/95239705927600267631.
Full textZHUANG, YONG-CHOU, and 莊永圳. "Applying signature and encryption technique to electronic mails and its VLSI implementation." Thesis, 1989. http://ndltd.ncl.edu.tw/handle/07644680198754296396.
Full text陳宜妙. "A video encryption and decryption technique using variable length coding and randomized bit-insertion." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/02682408071006153021.
Full textWu, Wen-Ho, and 吳文和. "The Study of Microoptic Elements and Moiré Technique Applying in Optical Encryption and Stereoscopic Image." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/6n52cz.
Full text