Dissertations / Theses on the topic 'SeChry'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'SeChry.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.
Full textNeubert, Janek. "Secure WebServer." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400894.
Full textBelostotsky, Eugene B. (Eugene Boris). "Secure SNMP." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42758.
Full textMahar, Anthony J. "Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/34434.
Full textTanik, Guven Orkun. "Secure Mail Gateway." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612038/index.pdf.
Full textMuhovic, Admir. "Secure Wireless Communication." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92023.
Full textSt-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.
Full textGuler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.
Full textHu, Nan. "SECURE IMAGE PROCESSING." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/448.
Full textAlsowail, Rakan. "Secure file sharing." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/63551/.
Full textCohn-Gordon, Katriel. "On secure messaging." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a6da6196-f216-4d57-9035-72903006197c.
Full textElsherbiny, Noha Ibrahim. "Secure Digital Libraries." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/33842.
Full textDrennan, James. "Secure Block Storage." University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1318611006.
Full textValverde, Lionel J., and Romelo B. Nafarrette. "Secure wireless handoff." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/943.
Full textDong, Renren. "Secure multiparty computation." Bowling Green, Ohio : Bowling Green State University, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1241807339.
Full textNafarrete, Romelo B. Valverde Lionel J. "Secure wireless handoff /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FNafarrete.pdf.
Full textYiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.
Full textWouters, Erik Henricus. "Secure Intermittent Computing." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254588.
Full textDu, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.
Full textDu, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Full textKim, Hyungjin. "Joint coding and security secure arithmetic coding and secure MIMO communications /." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1680039771&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Full textHines, Larry, and Jeff Kalibjian. "Securing Print Services for Telemetry Post-Processing Applications." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604260.
Full textKassahun, Mebratu. "Secure Routing in Structured P2P Overlay : Simulating Secure Routing on Chord DHT." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-24265.
Full textConroy, Tracy Michael Buxton Winslow Hurlburt. "Secure distributed file systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA285525.
Full textChew, Heng Hui. "A secure alert system." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FChew.pdf.
Full textVegge, Håvard. "Realizing Secure Multiparty Computations." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9004.
Full textChillakanti, Pratap. "Secure collaboration in onboarding." Thesis, Middlesex University, 2013. http://eprints.mdx.ac.uk/13007/.
Full textConroy, Tracy Michael, and Winslow Hurlburt Buxton. "Secure distributed file systems." Thesis, Monterey, California. Naval Postgraduate School, 1994. http://hdl.handle.net/10945/30928.
Full textPaul, Greig. "Secure decentralised storage networks." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28763.
Full textSaad, Amna. "Secure VoIP performance measurement." Thesis, Loughborough University, 2013. https://dspace.lboro.ac.uk/2134/13426.
Full textFan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.
Full textAkeel, Fatmah Y. "Secure data integration systems." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/415716/.
Full textBerglund, Tony. "Secure DNS transport methods." Thesis, Umeå universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-175880.
Full textDong, Renren. "Secure Multi-Party Computation." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1241807339.
Full textVaya, Shailesh. "Almost everywhere secure computation." Diss., Restricted to subscribing institutions, 2006. http://proquest.umi.com/pqdweb?did=1273137841&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Full textXie, Mengjun. "Towards secure message systems." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623341.
Full textGoldenberg, David. "Forward Secure Fuzzy Extractors." W&M ScholarWorks, 2007. https://scholarworks.wm.edu/etd/1539626862.
Full textDykas, Matthew Jason. "Adolescent secure-base use and parental secure-base support relations with adolescent attachment security /." College Park, Md. : University of Maryland, 2003. http://hdl.handle.net/1903/271.
Full textLychev, Robert D. "Evaluating security-enhanced interdomain routing protocols in full and partial deployment." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52325.
Full textWeiler, Nathalie. "SANGRIA Secure ANonymous GRoup InfrAstructure /." [S.l.] : [s.n.], 2002. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=14770.
Full textJotterand, Arnaud. "Usage control in secure messaging." Zürich : ETH, Swiss Federal Institute of Technology Zurich, Department of Computer Science, 2008. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=362.
Full textWagner, Rolf. "Secure verification of computational power." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institute of Information Security, 2009. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=450.
Full textGoyal, Vipul. "Stronger notions of secure computation." Diss., Restricted to subscribing institutions, 2009. http://proquest.umi.com/pqdweb?did=2025452011&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Full textFibíková, Lenka. "Provable secure scalable block ciphers." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=971192898.
Full textBellardo, John Michael. "Secure and efficient wireless networks." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3220376.
Full textKothapalli, Purushotham. "Secure storage of encryption keys." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9062.
Full textZabel, Martin, Thomas B. Preußer, Peter Reichel, and Rainer G. Spallek. "SHAP-Secure Hardware Agent Platform." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200701011.
Full textBogdanski, Jan. "Experimental multiuser secure quantum communications." Doctoral thesis, Stockholms universitet, Fysikum, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-26498.
Full textZhang, Feng. "Secure Mobile Service-Oriented Architecture." Doctoral thesis, KTH, Kommunikation: Infrastruktur och tjänster, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-95328.
Full textWu, Yucheng. "A secure mobile social network." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-189243.
Full text