To see the other types of publications on this topic, follow the link: SeChry.

Dissertations / Theses on the topic 'SeChry'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'SeChry.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2005.<br>Ramachandran, Umakishore, Committee Member ; Lee, Wenke, Committee Member ; Blough, Douglas M., Committee Member ; Venkateswaran, H., Committee Member ; Ahamad, Mustaque, Committee Member. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
2

Neubert, Janek. "Secure WebServer." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Belostotsky, Eugene B. (Eugene Boris). "Secure SNMP." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42758.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (leaves 51-52).<br>by Eugene B. Belostotsky.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
4

Mahar, Anthony J. "Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/34434.

Full text
Abstract:
<p>Software protection is increasingly necessary for a number of applications, ranging from commercial systems and digital content distributors, to military systems exposed in the field of operations. As computing devices become more pervasive, and software more complex, insufficiencies with current software protection mechanisms have arisen. Software--only and data--only protection systems have resulted in broken systems that are vulnerable to loss of software confidentiality and integrity. </p><p> A growing number of researchers have suggested that hardware encryption mechanisms be employe
APA, Harvard, Vancouver, ISO, and other styles
5

Tanik, Guven Orkun. "Secure Mail Gateway." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612038/index.pdf.

Full text
Abstract:
Past few decades witnessed the birth and explosive growth of the internet and the communications &ndash<br>most notably the electronic mail- through it. Studies indicate that although security measures are deployed, their usage is very limited and problematic. This work proposes a system to address some of the shortcomings of present mail security systems, such as underutilization, complicated key management and unwanted immunization against filtering-scanning. A two-layer message encryption scheme with domain level keys is introduced and a performance analysis is presented. An analysis of the
APA, Harvard, Vancouver, ISO, and other styles
6

Muhovic, Admir. "Secure Wireless Communication." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92023.

Full text
Abstract:
The need for and requests for utilization of wireless equipment are growing rapidly. Advantages of using wireless communication are easy to realize. Having access to electronically stored information no matter where you are is a big advantage. Furthermore, wireless communication is increasingly utilized in everyday work and there is a constant development of new wireless equipment. Today, utilization of wireless communication is very practical as well as effective. On the other hand, using wireless equipment and communication entails risk unless efforts are made to secure this communication. S
APA, Harvard, Vancouver, ISO, and other styles
7

St-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.

Full text
Abstract:
To the field of cryptography, quantum mechanics is a game changer. The exploitation of quantum mechanical properties through the manipulation of quantum information, the information encoded in the state of quantum systems, would allow many protocols in use today to be broken as well as lead to the expansion of cryptography to new protocols. In this thesis, quantum encryption, i.e. encryption schemes for quantum data, is defined, along with several definitions of security, broadly divisible into semantic security and ciphertext indistinguishability, which are proven equivalent, in analogy to th
APA, Harvard, Vancouver, ISO, and other styles
8

Guler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.

Full text
Abstract:
Virtual currencies and mobile banking are technology advancements that are receiving increased attention in the global community because of their accessibility, convenience and speed. However, this popularity comes with growing security concerns, like increasing frequency of identity theft, leading to bigger problems which put user anonymity at risk. One possible solution for these problems is using cryptography to enhance security of Bitcoin or other decentralised digital currency systems and to decrease frequency of attacks on either communication channels or system storage. This report outl
APA, Harvard, Vancouver, ISO, and other styles
9

Hu, Nan. "SECURE IMAGE PROCESSING." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/448.

Full text
Abstract:
In todays heterogeneous network environment, there is a growing demand for distrusted parties to jointly execute distributed algorithms on private data whose secrecy needed to be safeguarded. Platforms that support such computation on image processing purposes are called secure image processing protocols. In this thesis, we propose a new security model, called quasi information theoretic (QIT) security. Under the proposed model efficient protocols on two basic image processing algorithms linear filtering and thresholding are developed. For both problems we consider two situations: 1) only tw
APA, Harvard, Vancouver, ISO, and other styles
10

Alsowail, Rakan. "Secure file sharing." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/63551/.

Full text
Abstract:
File sharing has become an indispensable part of our daily lives. The shared files might be sensitive, thus, their confidentially, integrity and availability should be protected. Such protection might be against external threats that are initiated by unauthorised users or insider threats that are initiated by authorised users. Our main interest in this thesis is with insider threats. Protecting shared files against insiders is a challenging problem. Insiders enjoy various characteristics such as being trusted and authorised, in addition to being inside the network perimeter and having knowledg
APA, Harvard, Vancouver, ISO, and other styles
11

Cohn-Gordon, Katriel. "On secure messaging." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a6da6196-f216-4d57-9035-72903006197c.

Full text
Abstract:
What formal guarantees should a secure messaging application provide? Do the most widely-used protocols provide them? Can we do better? In this thesis we answer these questions and with them give a formal study of modern secure messaging protocols, which encrypt the personal messages of billions of users. We give definitions and analyses of two protocols: one existing (Signal) and one new (ART). For Signal, we begin by extending and generalising classic computational models, in order to apply them to its complex ratcheting key derivations. With a threat model in mind we also define a security
APA, Harvard, Vancouver, ISO, and other styles
12

Elsherbiny, Noha Ibrahim. "Secure Digital Libraries." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/33842.

Full text
Abstract:
Digital libraries are an integration of complex computer and information systems that could benefit from a formal approach to design. There are various design aspects to consider in a digital library; a crucial aspect is security. Security often is a requirement in digital libraries that should be considered during the design process and not as an add-on feature. 5S provides a DL modeling framework, to define all the aspects of a digital library. It covers the different formats and types of digital objects stored, how they are grouped and organized, what sequence of operations occur in the dig
APA, Harvard, Vancouver, ISO, and other styles
13

Drennan, James. "Secure Block Storage." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1318611006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Valverde, Lionel J., and Romelo B. Nafarrette. "Secure wireless handoff." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/943.

Full text
Abstract:
Approved for public release, distribution is unlimited<br>With the rapidly growing demand for portable devices such as laptops, handheld computers and Personal Digital Assistants (PDAs) with wireless networking capabilities, the need for reliable wireless data network communication has also increased. Just like in mobile voice communication, users demand uninterrupted, secure wireless data communication as they move from place to place. Mobile IP satisfies some of these demands - it enables mobile devices with fixed IP addresses to be permanently reachable even as their point of attachment to
APA, Harvard, Vancouver, ISO, and other styles
15

Dong, Renren. "Secure multiparty computation." Bowling Green, Ohio : Bowling Green State University, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1241807339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Nafarrete, Romelo B. Valverde Lionel J. "Secure wireless handoff /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FNafarrete.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.<br>Thesis advisor(s): George W. Dinolt, Gurminder Singh. Includes bibliographical references (p. 75-78). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
17

Yiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.<br>Includes bibliographical references (leaves 71-77). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
18

Wouters, Erik Henricus. "Secure Intermittent Computing." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254588.

Full text
Abstract:
Low-power embedded systems exist in many forms. Using batteries for these devices generally imposes high maintenance costs and there are many applications where a grid connection is not feasible [1]. A solution for powering this class of embedded systems is energy harvesting. This can mean the use of energy from ambient RF-signals to power the device, or another form of ambient energy [2].These batteryless devices are generally unable to harvest enough power for continuous operation and therefore employ some sort of checkpointing mechanism to copy (parts of) the main memory to non-volatile sto
APA, Harvard, Vancouver, ISO, and other styles
19

Du, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
20

Du, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.

Full text
Abstract:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal
APA, Harvard, Vancouver, ISO, and other styles
21

Kim, Hyungjin. "Joint coding and security secure arithmetic coding and secure MIMO communications /." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1680039771&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hines, Larry, and Jeff Kalibjian. "Securing Print Services for Telemetry Post-Processing Applications." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604260.

Full text
Abstract:
ITC/USA 2006 Conference Proceedings / The Forty-Second Annual International Telemetering Conference and Technical Exhibition / October 23-26, 2006 / Town and Country Resort & Convention Center, San Diego, California<br>One of the primary goals of telemetry post processing is to format received data for review and analysis. This occurs by both displaying processed data on video monitors and by printing out the results to hardcopy media. Controlling access (i.e. viewing) of telemetry data in soft form (i.e. video monitor) is achieved by utilizing the existing framework of authentication and
APA, Harvard, Vancouver, ISO, and other styles
23

Kassahun, Mebratu. "Secure Routing in Structured P2P Overlay : Simulating Secure Routing on Chord DHT." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-24265.

Full text
Abstract:
Fully distributed systems offer the highest level of freedom for the users. For this reason, in today’s Internet, it is recorded that more than 50% of the packets moving in and out belong to this type of network. Huge networks of this kind are built on the top of DHTs, which follow a more structured communication compared to the other small peer-to-peer networks. Although nature always favors freedom and independ-ence, security issues force consumers to set up their network in a cen-trally controlled manner. One of security threats posed on such net-works is lookup attacks. A lookup attacks ar
APA, Harvard, Vancouver, ISO, and other styles
24

Conroy, Tracy Michael Buxton Winslow Hurlburt. "Secure distributed file systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA285525.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1994.<br>Thesis advisor(s): Roger Stemp, Kishore Sengupta. "September 1994." Bibliography: p. 106-108. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
25

Chew, Heng Hui. "A secure alert system." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FChew.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2006.<br>Thesis Advisor(s): Gurminder Singh, Karen Burke. "December 2006." Includes bibliographical references (p. 63-66). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
26

Vegge, Håvard. "Realizing Secure Multiparty Computations." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9004.

Full text
Abstract:
<p>In this thesis the Virtual Ideal Functionality Framework (VIFF) has been used for implementing practical applications based on multiparty computation (MPC). The work started with a theoretical study of secret sharing and multiparty computation. VIFF, its functionality and mode of operation were also thoroughly investigated. In addition, an overview of electronic voting, challenges and typical security requirements have been briefly examined. The background study led to the development of two applications. The first was a small GUI program in which participants on some scientific paper can
APA, Harvard, Vancouver, ISO, and other styles
27

Chillakanti, Pratap. "Secure collaboration in onboarding." Thesis, Middlesex University, 2013. http://eprints.mdx.ac.uk/13007/.

Full text
Abstract:
The process of onboarding a company is characterized by inter-enterprise collaboration between the acquiring and the acquired companies. Multiple cross-functional teams are formed to assimilate and integrate the processes, products, data, customers, and partners of the company under acquisition. Dynamic access control management in such inter-enterprise collaboration is the subject of this thesis. A problem in inter-enterprise collaboration in onboarding is that information assets shared by collaborating teams are not adequately protected. As a result, there is potential for accidental or mali
APA, Harvard, Vancouver, ISO, and other styles
28

Conroy, Tracy Michael, and Winslow Hurlburt Buxton. "Secure distributed file systems." Thesis, Monterey, California. Naval Postgraduate School, 1994. http://hdl.handle.net/10945/30928.

Full text
Abstract:
Secure information distribution is a strategic capability as significant as weapons systems and tactics to military operations. The Department of Defense has recognized the importance of establishing and maintaining secure distributed file systems and explores the practicality and applicability of one such system, Trusted Ficus File System (TRUFFLES), in the DoD infrastructure. Integrated into this research are discussions of Privacy Enhanced Mail (PEM), which is currently an integral part of the TRUFFLES implementation. This thesis concludes with a discussion of the actual installation of a P
APA, Harvard, Vancouver, ISO, and other styles
29

Paul, Greig. "Secure decentralised storage networks." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28763.

Full text
Abstract:
In recent years, cloud-based computing and storage have become increasingly popular,as they remove the need for users and developers to buy or rent expensive dedicated hardware on an ongoing basis. This has led to the increasing centralisation of both services and storage, where users are reliant upon a small number of cloud-based providers to hold their data, and provide them with services they use. Recent events have shown that security breaches of centralised data stores can lead to significant quantities of personal data being revealed. This centralisation can also result in inconvenience
APA, Harvard, Vancouver, ISO, and other styles
30

Saad, Amna. "Secure VoIP performance measurement." Thesis, Loughborough University, 2013. https://dspace.lboro.ac.uk/2134/13426.

Full text
Abstract:
This project presents a mechanism for instrumentation of secure VoIP calls. The experiments were run under different network conditions and security systems. VoIP services such as Google Talk, Express Talk and Skype were under test. The project allowed analysis of the voice quality of the VoIP services based on the Mean Opinion Score (MOS) values generated by Perceptual valuation of Speech Quality (PESQ). The quality of the audio streams produced were subjected to end-to-end delay, jitter, packet loss and extra processing in the networking hardware and end devices due to Internetworking Layer
APA, Harvard, Vancouver, ISO, and other styles
31

Fan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.

Full text
Abstract:
Graphs are powerful tools for a wide range of real applications, from Biological and Chemical Databases, Social Networks, Citation Networks to Knowledge Bases. Large graph data repositories have been consistently found in recent applications. Due to the high complexity of graph queries, e.g., NP-Completeness of subgraph query, and the lack of IT expertise, hosting efficient graph query services for the owners of graph data has been a technically challenging task. And hence, they may prefer to outsource their services to third-party service providers (SPs) for scalability, elasticity and effici
APA, Harvard, Vancouver, ISO, and other styles
32

Akeel, Fatmah Y. "Secure data integration systems." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/415716/.

Full text
Abstract:
As the web moves increasingly towards publishing data, a significant challenge arises when integrating data from diverse sources that have heterogeneous security and privacy policies and requirements. Data Integration Systems (DIS) are concerned with integrating data from multiple data sources to resolve users' queries. DIS are prone to data leakage threats, e.g. unauthorised disclosure or secondary use of the data, that compromise the data's confidentiality and privacy. We claim that these threats are caused by the failure to implement or correctly employ confidentiality and privacy technique
APA, Harvard, Vancouver, ISO, and other styles
33

Berglund, Tony. "Secure DNS transport methods." Thesis, Umeå universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-175880.

Full text
Abstract:
The Domain Name System (DNS) is a large cornerstone in internet traffic. It translates domain names to IP addresses. Standard DNS(Do53) does not encrypt any of its traffic which leads to some security issues. Mainly that others are able to extract information and tamper with the DNS requests and responses. Two promising secure DNS protocols are DNS over HTTPS (DoH) and DNS over TLS (DoT). They use encryption and authentication in the transfer of data to prevent the issues caused by standard DNS. In this paper a study is presented that compares the two mentioned secure DNS protocols along with
APA, Harvard, Vancouver, ISO, and other styles
34

Dong, Renren. "Secure Multi-Party Computation." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1241807339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Vaya, Shailesh. "Almost everywhere secure computation." Diss., Restricted to subscribing institutions, 2006. http://proquest.umi.com/pqdweb?did=1273137841&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Xie, Mengjun. "Towards secure message systems." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623341.

Full text
Abstract:
Message systems, which transfer information from sender to recipient via communication networks, are indispensable to our modern society. The enormous user base of message systems and their critical role in information delivery make it the top priority to secure message systems. This dissertation focuses on securing the two most representative and dominant messages systems---e-mail and instant messaging (IM)---from two complementary aspects: defending against unwanted messages and ensuring reliable delivery of wanted messages.;To curtail unwanted messages and protect e-mail and instant messagi
APA, Harvard, Vancouver, ISO, and other styles
37

Goldenberg, David. "Forward Secure Fuzzy Extractors." W&M ScholarWorks, 2007. https://scholarworks.wm.edu/etd/1539626862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Dykas, Matthew Jason. "Adolescent secure-base use and parental secure-base support relations with adolescent attachment security /." College Park, Md. : University of Maryland, 2003. http://hdl.handle.net/1903/271.

Full text
Abstract:
Thesis (M.A.) -- University of Maryland, College Park, 2003.<br>Thesis research directed by: Dept. of Psychology. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
39

Lychev, Robert D. "Evaluating security-enhanced interdomain routing protocols in full and partial deployment." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52325.

Full text
Abstract:
The Internet consists of over 50 thousand smaller networks, called Autonomous Systems (ASes) (e.g., AT&T, Sprint, Google), that use the Border Gateway Protocol (BGP) to figure out how to reach each other. One way or another, we all rely on BGP because it is what glues the Internet together, but despite its crucial role, BGP remains vulnerable to propagation of bogus routing information due to malicious attacks or unintentional misconfigurations. The United States Department of Homeland Security (DHS) views BGP security as part of its national strategy for securing the Internet, and there is a
APA, Harvard, Vancouver, ISO, and other styles
40

Weiler, Nathalie. "SANGRIA Secure ANonymous GRoup InfrAstructure /." [S.l.] : [s.n.], 2002. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=14770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Jotterand, Arnaud. "Usage control in secure messaging." Zürich : ETH, Swiss Federal Institute of Technology Zurich, Department of Computer Science, 2008. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Wagner, Rolf. "Secure verification of computational power." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institute of Information Security, 2009. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Goyal, Vipul. "Stronger notions of secure computation." Diss., Restricted to subscribing institutions, 2009. http://proquest.umi.com/pqdweb?did=2025452011&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Fibíková, Lenka. "Provable secure scalable block ciphers." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=971192898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bellardo, John Michael. "Secure and efficient wireless networks." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3220376.

Full text
Abstract:
Thesis (Ph. D.)--University of California, San Diego, 2006.<br>Title from first page of PDF file (viewed September 8, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 99-103).
APA, Harvard, Vancouver, ISO, and other styles
46

Kothapalli, Purushotham. "Secure storage of encryption keys." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9062.

Full text
Abstract:
<p>The purpose of this thesis work was to make a survey of presently existing devices available in the market to store encryption keys; how the hacker intrudes into the device; what are the attacks behind</p><p>theft of the keys; how can we store encryption keys securely?</p><p>To achieve this purpose, an overview of the storage devices and attacks made by hackers was acquired through academic books and papers, Internet sites and magazines. Basic cryptography and related</p><p>algorithms were studied for the purpose of knowing how the encryption key is generated from these algorithms.</p><p>Un
APA, Harvard, Vancouver, ISO, and other styles
47

Zabel, Martin, Thomas B. Preußer, Peter Reichel, and Rainer G. Spallek. "SHAP-Secure Hardware Agent Platform." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200701011.

Full text
Abstract:
This paper presents a novel implementation of an embedded Java microarchitecture for secure, realtime, and multi-threaded applications. Together with the support of modern features of object-oriented languages, such as exception handling, automatic garbage collection and interface types, a general-purpose platform is established which also fits for the agent concept. Especially, considering real-time issues, new techniques have been implemented in our Java microarchitecture, such as an integrated stack and thread management for fast context switching, concurrent garbage collection for real-tim
APA, Harvard, Vancouver, ISO, and other styles
48

Bogdanski, Jan. "Experimental multiuser secure quantum communications." Doctoral thesis, Stockholms universitet, Fysikum, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-26498.

Full text
Abstract:
We are currently experiencing a rapid development of quantum information, a new branch of science, being an interdisciplinary of quantum physics, information theory, telecommunications, computer science, and many others. This new science branch was born in the middle of the eighties, developed rapidly during the nineties, and in the current decade has brought a technological breakthrough in creating secure quantum key distribution (QKD), quantum secret sharing, and exciting promises in diverse technological fields. Recent QKD experiments have achieved high rate QKD at 200 km distance in optica
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Feng. "Secure Mobile Service-Oriented Architecture." Doctoral thesis, KTH, Kommunikation: Infrastruktur och tjänster, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-95328.

Full text
Abstract:
Mobile transactions have been in development for around ten years. More and more initiatives and efforts are invested in this area resulting in dramatic and rapid development and deployment of mobile technologies and applications. However, there are still many issues that hinder wider deployment and acceptance of mobile systems, especially those handling serious and sensitive mobile transactions. One of the most important of them is security.This dissertation is focused on security architecture for mobile environments. Research issues addressed in this dissertation are based on three currently
APA, Harvard, Vancouver, ISO, and other styles
50

Wu, Yucheng. "A secure mobile social network." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-189243.

Full text
Abstract:
Mobile social networks are a new trend to improve the quality of our life, so they should not bring any extra burden to users. The users should not anymore be worried how to set up a secure complex password and memorize it to prove their identities. The Generic Bootstrapping Architecture is used in this thesis as a novel way of authentication. The GBA protocol allows to generate and share cryptographic keys between a mobile phone and third party service providers using the operator  as intermediary. These keys are generated transparently without any user interaction. In a traditional mobile so
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!