Dissertations / Theses on the topic 'Secrecy efficiency'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 30 dissertations / theses for your research on the topic 'Secrecy efficiency.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Alotaibi, Nafel Nahes A. "Improving secrecy and spectral efficiency of wireless communications." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/improving-secrecy-and-spectral-efficiency-of-wireless-communications(55496177-4602-42ff-99e4-7a65d26e08f9).html.
Full textBarceló, Lladó Joan Enric. "Communications in Wireless Sensor Networks: Compression, Energy Efficiency and Secrecy." Doctoral thesis, Universitat Autònoma de Barcelona, 2012. http://hdl.handle.net/10803/97359.
Full textTanga, Vikas Reddy. "The Chief Security Officer Problem." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404557/.
Full textPolisetti, Mounika. "Physical Layer Security With Active Jamming Using NOMA." Thesis, Blekinge Tekniska Högskola, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21259.
Full textVasudevan, Prashant Nalini. "A study of efficient secret sharing." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101590.
Full textChoudary, Omar-Salim. "Efficient multivariate statistical techniques for extracting secrets from electronic devices." Thesis, University of Cambridge, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708342.
Full textLüdtke, Susann [Verfasser]. "The Secret of Lobbying in China : Who Influences Building Energy Efficiency Standards? / Susann Lüdtke." Baden-Baden : Nomos Verlagsgesellschaft mbH & Co. KG, 2020. http://d-nb.info/1212393503/34.
Full textAbdulla, Alan Anwer. "Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/149/.
Full textPotay, Sunny. "Efficient algorithm to construct phi function in vector space secret sharing scheme and application of secret sharing scheme in Visual Cryptography." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1151.
Full textOsorio, Carlos Ivan Henao. "Robustness against noise and efficiency of two-way quantum key distribution protocols." reponame:Repositório Institucional da UFABC, 2014.
Find full textRichter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145086.
Full textRichter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28133.
Full text崇之, 清水. "Secure and efficient key generation schemes for secret key agreement based on radio propagation characteristics." Thesis, https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12424275/?lang=0, 2012. https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12424275/?lang=0.
Full textSubbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.
Full textWen, Wen. "Energy Efficient Secure Key Management Schemes for WSNs and IoT." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.
Full textJorswieck, Eduard A., Anne Wolf, and Sabrina Engelmann. "Secret key generation from reciprocal spatially correlated MIMO channels." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-143998.
Full textHo, Zuleita K. M., Eduard A. Jorswieck, and Sabrina Engelmann. "Efficient information leakage neutralization on a relay-assisted multi-carrier interference channel." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-128447.
Full textJorswieck, Eduard A., Anne Wolf, and Sabrina Engelmann. "Secret key generation from reciprocal spatially correlated MIMO channels." Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28101.
Full textHo, Zuleita, Eduard Jorswieck, and Sabrina Engelmann. "Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-121245.
Full textAditya, Riza. "Secure Electronic Voting with Flexible Ballot Structure." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16156/.
Full textMegahed, Mohamed Helmy Mostafa. "SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31154.
Full textHsu, Hsing, and 許行. "Efficient Secure Electronic Mail Protocols with Forward Secrecy." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/4w482y.
Full textLee, Chen-Kuei, and 李振魁. "Round-Efficient Conference Key Agreement Protocols with Forward Secrecy." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/06799614143224174850.
Full textFang, Jiun-Min, and 方竣民. "An Efficient Multi-group Secret Handshake Protocol." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/20356018698140179580.
Full textLiu, An-Ting, and 劉安庭. "Efficient Conference Key Protocol Based on Secret Sharing." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/68g439.
Full textChao, Cheng-Tsung, and 趙承宗. "Efficient Cheater Identification in Sequential Secret Sharing Schemes." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/48323577780858317542.
Full textLee, Wei, and 李威. "Efficient Secret Sharing with Access Structures in a Hierarchy." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/66864684608805400310.
Full textChung, I.-Chia, and 鍾一嘉. "An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/a5r7ze.
Full textHuang, Ta-ming, and 黃大明. "A New Efficient RFID Mutual Authentication Scheme based on Synchronized Secret Information." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/ss69k3.
Full textChen, Kuan-Hung, and 陳冠宏. "Efficient Multiparty Quantum Key Agreement based on Quantum Secret Direct Communication with GHZ States." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/19679952056662688721.
Full text