Dissertations / Theses on the topic 'No Key-Exchange'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'No Key-Exchange.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kurt, Yesem. "New key exchange primitives." [Bloomington, Ind.] : Indiana University, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3243768.
Full textManulis, Mark. "Provably secure group key exchange." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?id=2993029&prov=M&dok_var=1&dok_ext=htm.
Full textSoltwisch, Rene Alexander. "The Inter-Domain Key Exchange Protocol." Doctoral thesis, [S.l.] : [s.n.], 2006. http://hdl.handle.net/11858/00-1735-0000-0006-B403-2.
Full textUslu, Sevgi Koltuksuz Ahmet. "Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Library/." [s.l.]: [s.n.], 2007. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000618.pdf.
Full textWilliams, Stephen C. "On the security of key exchange protocols." Thesis, University of Bristol, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.556744.
Full textGarratt, Luke. "Realistic, strong and provable key exchange security." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:389973d5-9c96-4905-b412-2514578abf20.
Full textShah, Illana. "Quantum key exchange and mutually unbiased bases." Thesis, Royal Holloway, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.497647.
Full textZhang, J. "Authenticated key exchange protocols with unbalanced computational requirements." Thesis, University of Liverpool, 2018. http://livrepository.liverpool.ac.uk/3025159/.
Full textSnook, Michael. "Quantum Resistant Authenticated Key Exchange from Ideal Lattices." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1470757378.
Full textAl-Ismaily, Nasser. "Dynamic block encryption with self-authenticating key exchange." Thesis, Loughborough University, 2005. https://dspace.lboro.ac.uk/2134/7825.
Full textGorantla, Malakondayya Choudary. "Design and analysis of group key exchange protocols." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37664/1/Malakondayya_Gorantla_Thesis.pdf.
Full textNinet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.
Full textLippold, Georg. "Encryption schemes and key exchange protocols in the certificateless setting." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41697/1/Georg_Lippold_Thesis.pdf.
Full textWang, Hao-Hsien. "Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/1087.
Full textBrendel, Jacqueline Verfasser], Marc [Akademischer Betreuer] Fischlin, and Cas [Akademischer Betreuer] [Cremers. "Future-Proofing Key Exchange Protocols / Jacqueline Brendel ; Marc Fischlin, Cas Cremers." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2019. http://d-nb.info/1201482313/34.
Full textBoyko, Victor (Victor V. ). 1979. "On all-or-nothing transforms and password-authenticated key exchange protocols." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/81522.
Full textBrendel, Jacqueline [Verfasser], Marc [Akademischer Betreuer] Fischlin, and Cas [Akademischer Betreuer] Cremers. "Future-Proofing Key Exchange Protocols / Jacqueline Brendel ; Marc Fischlin, Cas Cremers." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2019. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-96427.
Full textBrendel, Jacqueline [Verfasser], Marc Akademischer Betreuer] Fischlin, and Cas [Akademischer Betreuer] [Cremers. "Future-Proofing Key Exchange Protocols / Jacqueline Brendel ; Marc Fischlin, Cas Cremers." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2019. http://d-nb.info/1201482313/34.
Full textLigozio, Kevin. "Jini distributed key exchange and file transfer service with digital signatures /." Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2812.
Full textAlsayigh, Saed A. "New Password Authenticated Key Exchange Based on the Ring Learning with Errors." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1468337264.
Full textBilien, Johan. "Key Agreement for Secure Voice over IP." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93069.
Full textBrzuska, Christopher [Verfasser], Marc [Akademischer Betreuer] Fischlin, and Bogdan [Akademischer Betreuer] Warinschi. "On the Foundations of Key Exchange / Christina Brzuska. Betreuer: Marc Fischlin ; Bogdan Warinschi." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2013. http://d-nb.info/1106454618/34.
Full textMyadam, Nishkal Gupta, and Bhavith Patnam. "Design and Implementation of Key Exchange Mechanisms for Software Artifacts using Ocean Protocol." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20665.
Full textPetri, Oliver, and Fredrik Sebek. "A Comparison of the Password-Authenticated Key Exchange Protocols, SRP-6a and PAKE2+." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259992.
Full textR, V. Saraswathy. "Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1521192556946491.
Full textGreene, Owen J., and P. Batchelor. "Information Exchange and Transparency: Key Elements of an International Action Programme on Small Arms." Thesis, British American Security Information Council (BASIC), International Alert and Saferworld, 2001. http://hdl.handle.net/10454/4267.
Full textSobreira, de Almeida Antonio Pedro [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "Key Exchange at the Physical Layer / Antonio Pedro Sobreira de Almeida. Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2015. http://d-nb.info/1082294519/34.
Full textFrank, Alexander Michael, and Alexander Michael Frank. "A Case Study in Non-Commutative Cryptography: Implementing Anshel-Anshel-Goldfeld Key Exchange in Python." Thesis, The University of Arizona, 2017. http://hdl.handle.net/10150/624985.
Full textLai, Yi-Fu, and 賴奕甫. "Post-Quantum Key Exchange." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/8p23qr.
Full textBrendel, Jacqueline. "Future-Proofing Key Exchange Protocols." Phd thesis, 2019. https://tuprints.ulb.tu-darmstadt.de/9642/1/thesis_published.pdf.
Full textLiu, Meng-Tzung, and 劉孟宗. "A Study on Weak Key Protectable Authenticated Key Exchange Protocols." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/73466880810971945762.
Full textChen, Huai-Hsien. "Implementation of Internet Key Exchange Protocol." 2004. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200423262600.
Full textChen, Huai-Hsien, and 陳懷先. "Implementation of Internet Key Exchange Protocol." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/61507602852405847722.
Full textBrzuska, Christina. "On the Foundations of Key Exchange." Phd thesis, 2013. https://tuprints.ulb.tu-darmstadt.de/3414/7/thesis-tuprint-2013.pdf.
Full textHSU, LIN-CHIH, and 許令芷. "Password authentication and key exchange protocol." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/59451420718306413483.
Full textLo, Jeng-hung, and 駱政宏. "Practical Three-Party Key Exchange Protocols." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/54827154240206300998.
Full textLee, Yi-Shan, and 李依珊. "Key management for cryptocurrency exchange platform." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/syvp54.
Full textChang, Ting-Yi, and 張庭毅. "Provably Secure Public Key Cryptosystems and Password Authenticated Key Exchange Protocol." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/84542928731206652529.
Full textStebila, Douglas. "Classical Authenticated Key Exchange and Quantum Cryptography." Thesis, 2009. http://hdl.handle.net/10012/4295.
Full textHsu, Chi-kuo, and 徐志國. "On Entity Authentication And Authenticated Key Exchange." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/76457346149117825046.
Full textLi, Wen-Hui, and 李文輝. "An Efficient Three-Party Key Exchange Protocol." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/59665431311256984116.
Full textTsao, Cheng-hao, and 曹正浩. "A Study on Dynamic Session Key Exchange." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71584086761548423916.
Full textYang, Ching-Ju, and 楊靜如. "Key Success Factors for Mammography Image Exchange." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/72384179843160173568.
Full textShiau, Sheng-Hua, and 蕭勝華. "The Design of Authentication Key Exchange Protocol." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/01764658227092139731.
Full text吳建男. "Research of Authenticated Multiple Key Exchange Protocol." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/05443648587076681723.
Full textWei, Wells, and 魏瑋志. "Key Exchange Based on Hierarchy Access Control." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/rr3q8u.
Full textHerdan, David Errol. "A cryptographically secure protocol for key exchange." Thesis, 2014. http://hdl.handle.net/10210/12037.
Full textWu, Shu-Yue, and 吳書樂. "Roaming Node Authentication With Key Exchange Protocol." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/gx9f97.
Full textSaha, Aakanksha. "Novel Contract Signature based on Key Exchange." Thesis, 2015. http://ethesis.nitrkl.ac.in/7022/1/Novel_Contract_Saha_2015.pdf.
Full textChang, Pen-Yi, and 張本毅. "Group Signature and Key Agreement Schemes Based on Diffie-Hellman Key Exchange Protocol." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/00699887042168121766.
Full text