Dissertations / Theses on the topic 'Secure Networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Secure Networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Tan, Hailun Computer Science & Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.
Full textYiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.
Full textPaul, Greig. "Secure decentralised storage networks." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28763.
Full textHia, Henry Erik. "Secure SNMP-Based Network Management in Low Bandwidth Networks." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32126.
Full textLim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.
Full textBellardo, John Michael. "Secure and efficient wireless networks." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3220376.
Full textFriji, Hamdi. "Graph neural network-based intrusion detection for secure edge networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS030.
Full textNawaz, Omer. "Secure Identification in Social Wireless Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4042.
Full textMirzadeh, Shahab. "Secure key management for personal networks." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543916.
Full textMehta, Haripriya(Haripriya P. ). "Secure inference of quantized neural networks." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127663.
Full textTin, Yiu Shing (Terry). "Secure key establishment for mobile networks." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16035/1/Yiu_Shing_Tin_Thesis.pdf.
Full textTin, Yiu Shing (Terry). "Secure Key Establishment for Mobile Networks." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16035/.
Full textRigby, Simon. "Key management in secure data networks." Thesis, Queensland University of Technology, 1987. https://eprints.qut.edu.au/36825/1/36825_Rigby_1987.pdf.
Full textChen, Lei Lee Chung-wei. "On secure media streaming with path diversity in MANETs." Auburn, Ala., 2007. http://repo.lib.auburn.edu/Send%2002-04-08/CHEN_LEI_20.pdf.
Full textSullivan, Mark P. "Secure remote network administration and power management." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSullivan.pdf.
Full textKim, Hyoungshick. "Complex network analysis for secure and robust communications." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610134.
Full textDong, Renren. "Secure multiparty computation." Bowling Green, Ohio : Bowling Green State University, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1241807339.
Full textGuerreiro, João. "Secure Web Services for Wireless Sensor Networks." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129474.
Full textTang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.
Full textKaradag, Gokdeniz. "Secure Communication Channel Mechanisms For Isolated Networks." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611436/index.pdf.
Full textAlhakami, Wajdi. "Secure MAC protocols for cognitive radio networks." Thesis, University of Bedfordshire, 2016. http://hdl.handle.net/10547/621831.
Full textOkano, Stephen Hiroshi. "Optimizing secure communication standards for disadvantaged networks." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/61316.
Full textAlqallaf, Maha. "Software Defined Secure Ad Hoc Wireless Networks." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464020851.
Full textRoy, Sankardas. "Secure data aggregation in wireless sensor networks." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3360.
Full textAlzaid, Hani Mohammed. "Secure data aggregation in wireless sensor networks." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41843/1/Hani_Alzaid_Thesis.pdf.
Full textSaleh, Mohammad. "Secure communications in wireless networks for biomedical EEG sensor networks applications." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCA024/document.
Full textChim, Tat-wing, and 詹達榮. "Secure and privacy-preserving protocols for VANETs." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46587755.
Full textKoneru, Sindoora. "SECURE BANDWIDTH EFFICIENT MULTICASTING FOR WIDE AREA NETWORKS." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/theses/170.
Full textPandey, Santosh Agrawal Prathima. "Secure localization and node placement strategies for wireless networks." Auburn, Ala., 2007. http://hdl.handle.net/10415/1388.
Full textGin, Andrew. "Building a Secure Short Duration Transaction Network." Thesis, University of Canterbury. Computer Science and Software Engineering, 2007. http://hdl.handle.net/10092/1188.
Full textAringunram, Ravichandran. "Secure communication services for distributed conference system." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000505.
Full textAntolino, Rivas David. "Reputation systems and secure communication in vehicular networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/117532.
Full textVogt, Harald. "Protocols for secure communication in wireless sensor networks /." Zürich : ETH, 2009. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=18174.
Full textUluagac, Arif Selcuk. "A secure communication framework for wireless sensor networks." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34713.
Full textRen, Yonglin. "Towards Secure and Trustworthy Wireless Ad hoc Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22909.
Full textPinto, Pedro C. (Pedro Correia). "Intrinsically secure communication in large-scale wireless networks." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/60173.
Full textKifayat, Kashif. "Group-based secure communication for wireless sensor networks." Thesis, Liverpool John Moores University, 2008. http://researchonline.ljmu.ac.uk/5899/.
Full textBiswas, Kamanashis. "Energy Efficient Secure Routing in Wireless Sensor Networks." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/365658.
Full textPetagna, Fabio. "Secure End-to-End Communications in Mobile Networks." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/1524.
Full textBrahmadesam, Murali M. "Framework for scalable secure source specific multicast." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000509.
Full textBenbrook, Jimmie Glen 1943. "A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.
Full textSingh, Aameek. "Secure Management of Networked Storage Services: Models and Techniques." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-04092007-004039/.
Full textKhabbazian, Majid. "Secure and efficient wireless ad hoc networking." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2847.
Full textDomingo, Prieto Marc. "Integrating secure mobile P2P systems and Wireless Sensor Networks." Doctoral thesis, Universitat Oberta de Catalunya, 2017. http://hdl.handle.net/10803/404534.
Full textChen, Hejun. "A framework for secure mobility in wireless overlay networks." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/819.
Full textLi, Xu. "Secure and anonymous routing in wireless ad-hoc networks." Thesis, University of Ottawa (Canada), 2005. http://hdl.handle.net/10393/26955.
Full textGranlund, Daniel. "Secure and scalable roaming support in heterogeneous access networks." Licentiate thesis, Luleå tekniska universitet, Datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17883.
Full textBassi, German. "Secure Communication and Cooperation in Interference-Limited Wireless Networks." Thesis, CentraleSupélec, 2015. http://www.theses.fr/2015SUPL0018/document.
Full textChen, Changlong. "Robust and Secure Spectrum Sensing in Cognitive Radio Networks." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1383316543.
Full textTaban, Gelareh. "Secure and private data aggregation in wireless sensor networks." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8884.
Full text