Dissertations / Theses on the topic 'Secure search'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 dissertations / theses for your research on the topic 'Secure search.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Katsilieris, Fotios. "Search and secure using mobile robots." Thesis, KTH, Reglerteknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105718.
Full textWang, Boyang, and Boyang Wang. "Secure Geometric Search on Encrypted Spatial Data." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625567.
Full textWang, Bing. "Search over Encrypted Data in Cloud Computing." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/71466.
Full textCao, Ning. "Secure and Reliable Data Outsourcing in Cloud Computing." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-dissertations/333.
Full textWoodworth, Jason W. "Secure Semantic Search over Encrypted Big Data in the Cloud." Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10286646.
Full textKulseng, Lars Skaar. "Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems." [Ames, Iowa : Iowa State University], 2009.
Find full textSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Full textTowell, Alexander R. "Encrypted Search| Enabling Standard Information Retrieval Techniques for Several New Secure Index Types While Preserving Confidentiality Against an Adversary With Access to Query Histories and Secure Index Contents." Thesis, Southern Illinois University at Edwardsville, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1601582.
Full textDahl, Linnéa, and Hanna Sandström. "In Search for Secure Families : A study of what qualifies as a suitable family for vulnerable children at a child protection organization in South Africa." Thesis, Hälsohögskolan, Högskolan i Jönköping, HHJ, Avd. för beteendevetenskap och socialt arbete, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40856.
Full textPriddis, DeAnne. "The search for work-life balance at SECURA." Menomonie, WI : University of Wisconsin--Stout, 2006. http://www.uwstout.edu/lib/thesis/2006/2006priddisd.pdf.
Full textKhorbatly, Mohamad. "Optimisation numérique appliquée à la gestion de crise : Approche basée sur un algorithme hybride pour la résolution du problème intégré d'ordonnancement et d'allocation des ressources." Thesis, Normandie, 2018. http://www.theses.fr/2018NORMLH18/document.
Full textLenong, Jentley. "A normative approach to state secession : in search of a legitimate right to secede." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85675.
Full textMillard, Lorna. "Our secret selves, a phenomenological study of the impact of secrecy and search an adoptees in closed adoptions." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0026/MQ51419.pdf.
Full textLeathers, Jane M. "CRACKING THE LINZ CIRCLE'S SECRET CODES: A SINGER'S GUIDE TO ALTERNATE INTERPRETATIONS OF SCHUBERT LIEDER." Bowling Green State University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1151698767.
Full textLiao, Tz-Hua, and 廖子驊. "Secure Serverless Search Scheme for RFID." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/84350862831564318038.
Full textHSU, Chao-Chi, and 許肇基. "The Study of RFID Secure Search Mechanism." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/19541939651983030087.
Full textShah, Akash. "Efficient and Secure Search over Encrypted Data." Thesis, 2019. https://etd.iisc.ac.in/handle/2005/4691.
Full textLin, Mao-Pang, and 林楙榜. "A Secure Indexed Keyword Search System over Encrypted Data for Multiple Users." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/80168974625127552082.
Full textBeck, Martin. "Secure and Efficient Comparisons between Untrusted Parties." Doctoral thesis, 2018. https://tud.qucosa.de/id/qucosa%3A31118.
Full textHsu, Jen-Yuan, and 許任媛. "The rebel plan of authority 「Search The Secret Garden」-2009-2011 creative discourse." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/4hma84.
Full textChang, Yu-Hsuan, and 張語軒. "Ciphertext-Policy Attribute-Based Keyword Search with Revocation by Using Linear Secret Sharing Approach." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/8v5t6g.
Full textLien, I.-Ting, and 連奕婷. "A Novel Privacy Preserving Location-Based Service Protocolwith Secret Circular Shift for k-NN Search." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/94925537856414476902.
Full textПілкін, Євген Сергійович. "Основи методики розслідування розголошення таємниці усиновлення (удочеріння)". Магістерська робота, 2020. https://dspace.znu.edu.ua/jspui/handle/12345/2580.
Full textЗагородній, Ігор Вікторович, Игорь Викторович Загородний та Igor V. Zagorodny. "Розслідування злочинів, пов’язаних із нанесенням тілесних ушкоджень". Thesis, 2018. http://hdl.handle.net/11300/9316.
Full text