Dissertations / Theses on the topic 'Secret keys'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Secret keys.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lim, Daihyun 1976. "Extracting secret keys from integrated circuits." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/18059.
Full textYe, Chunxuan. "Information theoretic generation of multiple secret keys." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/3078.
Full textR, V. Saraswathy. "Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1521192556946491.
Full textBharath, Tati. "A framework to implement delegation in offline PACS : A strategy to restrict user’s path." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127851.
Full textEneroth, Nathanael. "Securing LBO VoLTE roaming with multiple Escrow Agents : A dynamic approach to distribute cryptographic keys to Escrow Agents." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240425.
Full textJarecki, Stanisław (Stanisław Michal) 1971. "Proactive secret sharing and public key cryptosystems." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/41024.
Full textMcConnell, Sarah E. "The Key to Unlocking the Secret Window." Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc33226/.
Full textUslu, Sevgi Koltuksuz Ahmet. "Basic Key Exchange Protocols For Secret Key Cryptosystems Under Crympix Library/." [s.l.]: [s.n.], 2007. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000618.pdf.
Full textSheppard, Castillo Karen. "Fatca and its key provisions and the issues of its application in Peru." Pontificia Universidad Católica del Perú, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/116228.
Full textWu, Qiang. "Localization-based Secret Key Agreement for Wireless Network." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1429702519.
Full textJorswieck, Eduard A., Anne Wolf, and Sabrina Engelmann. "Secret key generation from reciprocal spatially correlated MIMO channels." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-143998.
Full textJorswieck, Eduard A., Anne Wolf, and Sabrina Engelmann. "Secret key generation from reciprocal spatially correlated MIMO channels." Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28101.
Full textTunaru, Iulia. "Physical layer secret key generation for decentralized wireless networks." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S081/document.
Full textOlsson, Fredrik. "A Lab System for Secret Sharing." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2385.
Full text崇之, 清水. "Secure and efficient key generation schemes for secret key agreement based on radio propagation characteristics." Thesis, https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12424275/?lang=0, 2012. https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12424275/?lang=0.
Full textQuist, Britton T. "Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems." BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3554.
Full textWen, Wen. "Energy Efficient Secure Key Management Schemes for WSNs and IoT." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.
Full textFokin, Dennis. "A secure multi-party scheme with certificateless cryptography for secret key extraction." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231574.
Full textKothapalli, Purushotham. "Secure storage of encryption keys." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9062.
Full textCosta, Pier Francesco. "Ethereum blockchain as a decentralized and autonomous key server: storing and extracting public keys through smart contracts." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14306/.
Full textPierrot, Alexandre Jean Louis J. "Coding techniques for multi-user physical layer security." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53836.
Full textMertz, Markus [Verfasser], Dagmar [Akademischer Betreuer] Bruß, and Jörg [Akademischer Betreuer] Rothe. "Quantum key distribution with finite resources: Improving secret key rates / Markus Mertz. Gutachter: Dagmar Bruß ; Jörg Rothe." Düsseldorf : Universitäts- und Landesbibliothek der Heinrich-Heine-Universität Düsseldorf, 2012. http://d-nb.info/102718362X/34.
Full textVillena, Reynaldo Caceres. "Reconstrução da chave secreta do RSA multi-primo." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-13082014-141746/.
Full textTomescu, Nicolescu Ioan Alin. "How to keep a secret and share a public key (using polynomial commitments)." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/128298.
Full textGhiotto, Nicolo' <1994>. "Visual Cryptography Schemes with Multiple Secrets and Visual Key Derivation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/13323.
Full textCastro, Junior Waldir Claudio de. "Criando mensagens secretas na escola básica utilizando a criptografia – RSA." Universidade Federal de São Carlos, 2015. https://repositorio.ufscar.br/handle/ufscar/7234.
Full textChen, Chan. "Secret Key Establishment Using Wireless Channels as Common Randomness in Time-Variant MIMO Systems." Diss., CLICK HERE for online access, 2010. http://contentdm.lib.byu.edu/ETD/image/etd3532.pdf.
Full textShlyak, Tatyana. "Secret as a key to narration : evolution from English Gothic to the Gothic in Dostoyevsky /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6667.
Full textMonson, Tyler Jay. "Usable Secure Email Through Short-Lived Keys." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6568.
Full textSun, Xiaole, Ivan B. Djordjevic, and Mark A. Neifeld. "Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels." IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/621687.
Full textTin, Yiu Shing (Terry). "Secure key establishment for mobile networks." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16035/1/Yiu_Shing_Tin_Thesis.pdf.
Full textTin, Yiu Shing (Terry). "Secure Key Establishment for Mobile Networks." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16035/.
Full textCho, Jin-Hee. "Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/29653.
Full textTu, Zhiqi. "Enhancements of the Non-linear Knapsack Cryptosystem." Thesis, University of Canterbury. Computer Science and Software Engineering, 2006. http://hdl.handle.net/10092/1080.
Full textMyadam, Nishkal Gupta, and Bhavith Patnam. "Design and Implementation of Key Exchange Mechanisms for Software Artifacts using Ocean Protocol." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20665.
Full textChen, Kan. "Physical layer security in co-operative MIMO networks - key generation and reliability evaluation." Diss., Kansas State University, 2016. http://hdl.handle.net/2097/32839.
Full textKoneni, Madhu. "Key Management Techniques for Dynamic Secure Multicasting." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33061.
Full textFrixons, Paul. "Cryptographie à clé secrète et attaquant quantique dans le monde des télécommunications." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS339.
Full textRAMMOHAN, SRIVIDHYA. "REDUCED COMPLEMENTARY DYNAMIC AND DIFFERENTIAL CMOS LOGIC: A DESIGN METHODOLOGY FOR DPA RESISTANT CRYPTOGRAPHIC CIRCUITS." University of Cincinnati / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1179459225.
Full textRiahinia, Mahshid. "Constrained Pseudorandom Functions : New Constructions and Connections with Secure Computation." Electronic Thesis or Diss., Lyon, École normale supérieure, 2024. http://www.theses.fr/2024ENSL0022.
Full textQu, Zhen, and Ivan B. Djordjevic. "High-speed continuous-variable quantum key distribution over atmospheric turbulent channels." SPIE-INT SOC OPTICAL ENGINEERING, 2017. http://hdl.handle.net/10150/626486.
Full textLimmanee, Apirath [Verfasser]. "Network Coding and Wireless Physical-layer Secret-key Generation: From Unequal Erasure Protection (UEP) to Unequal Security Protection (USP) / Apirath Limmanee." Bremen : IRC-Library, Information Resource Center der Jacobs University Bremen, 2012. http://d-nb.info/1035210630/34.
Full textValkaitis, Mindaugas. "Efektyvios šifravimo bei skaitmeninio parašo sistemos." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171717-30545.
Full textGungor, Onur. "INFORMATION THEORY ENABLED SECURE WIRELESS COMMUNICATION, KEY GENERATION AND AUTHENTICATION." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1406298547.
Full textOttallah, Noor. "Implementation of Secure Key Management Techniques in Wireless Sensor Networks." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/703.
Full textYadav, Tarun Kumar. "Automatic Detection and Prevention of Fake Key Attacks in Signal." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/9072.
Full textSaryčevienė, Natalija. "Simetrinės šifravimo sistemos realizavimas Windows aplinkoje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2005~D_20050609_100555-66703.
Full textAndersen, Jeffrey Thomas. "The Quest to Secure Email: A Usability Analysis of Key Management Alternatives." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6461.
Full textBADAWY, AHMED MOHAMED HABELROMAN B. M. "Practical Secrecy at the Physical Layer: Key Extraction Methods with Applications in Cognitive Radio." Doctoral thesis, Politecnico di Torino, 2017. http://hdl.handle.net/11583/2674477.
Full textGerber, Katherine Maureen. "THE CAPACITY TO SECRETE INSULIN IS DOSE-DEPENDENT TO EXTEMELY HIGH GLUCOSE CONCENTRATIONS: A KEY ROLE FOR ADENYLYL CYCLASE." Ohio University Honors Tutorial College / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1619178997628352.
Full text