Dissertations / Theses on the topic 'Ubiquitous Computing Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 31 dissertations / theses for your research on the topic 'Ubiquitous Computing Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Stajano, Francesco Mario. "Security for ubiquitous computing." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621022.
Full textKilian-Kehr, Roger. "Mobile security with smartcards." Phd thesis, [S.l.] : [s.n.], 2002. http://elib.tu-darmstadt.de/diss/000214.
Full textHayat, Mohammed Zia. "Information Security Risk Management for Ubiquitous Computing." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.484894.
Full textRansom, Stefan. "Managing security and dependability in ubiquitous computing environments." Lübeck Zentrale Hochschulbibliothek Lübeck, 2010. http://d-nb.info/1002133211/34.
Full textScott, David Jonathan. "Abstracting application-level security policy for ubiquitous computing." Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.614755.
Full textRansom, Stefan [Verfasser]. "Managing security and dependability in ubiquitous computing environments / Stefan Ransom." Lübeck : Zentrale Hochschulbibliothek Lübeck, 2010. http://d-nb.info/1002133211/34.
Full textLiu, Huanjin. "Free roaming: A system for ubiquitous computing." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3062.
Full textCovington, Michael J. "A flexible security architecture for pervasive computing environments." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-06072004-131113/unrestricted/covington%5Fmichael%5Fj%5F200405%5Fphd.pdf.
Full textPérez-Martínez, Pablo Alejandro. "Contributions to privacy protection for ubiquitous computing." Doctoral thesis, Universitat Rovira i Virgili, 2015. http://hdl.handle.net/10803/334398.
Full textKusen, Ema, and Mark Strembeck. "Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing." Department für Informationsverarbeitung und Prozessmanagement, WU Vienna University of Economics and Business, 2014. http://epub.wu.ac.at/4429/1/SLRprotocol.pdf.
Full textChatfield, Craig Andrew. "Privacy and Security in Ubiquitous Computing: Service Delivery and Identity in Intelligent Environments." Thesis, Griffith University, 2010. http://hdl.handle.net/10072/367314.
Full textMilagres, Francisco Gomes. "Uso de informações de contexto em segurança computacional." Universidade de São Paulo, 2004. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08112006-141232/.
Full textIachello, Giovanni. "Privacy and Proportionality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10487.
Full textDas, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.
Full textVasanta, Harikrishna. "Secure, privacy assured mechanisms for heterogeneous contextual environments." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16177/1/Harikrishna_Vasanta_Thesis.pdf.
Full textVasanta, Harikrishna. "Secure, privacy assured mechanisms for heterogeneous contextual environments." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16177/.
Full textLeemaqz, Kaleb Lee. "Privacy of RFID - models and protocols." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60900/1/Kaleb_Leemaqz_Thesis.pdf.
Full textPaul, Arnab. "Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6848.
Full textLeung, Adrian Ho Yin. "Securing mobile ubiquitous services trusted computing." Thesis, Royal Holloway, University of London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537518.
Full textJakob, Henner. "Vers la sécurisation des systèmes d'informatique ubiquitaire par le design : une approche langage." Thesis, Bordeaux 1, 2011. http://www.theses.fr/2011BOR14269/document.
Full textRosa, Diórgenes Yuri Leal da. "EXEHDA-SO: uma abordagem ontológica para ciência de situação aplicada ao domínio de segurança da informação." Universidade Federal de Pelotas, 2017. http://repositorio.ufpel.edu.br:8080/handle/prefix/3841.
Full textKillijian, Marc-Olivier. "CONTRIBUTIONS À LA RÉSILIENCE ET AU RESPECT DE LA VIE PRIVÉE DES SYSTÈMES MOBIQUITAIRES." Habilitation à diriger des recherches, Université Paul Sabatier - Toulouse III, 2013. http://tel.archives-ouvertes.fr/tel-00849725.
Full textMtita, Collins. "Lightweight serverless protocols for the internet of things." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0010/document.
Full textMtita, Collins. "Lightweight serverless protocols for the internet of things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0010.
Full textGiansiracusa, Michelangelo Antonio. "A secure infrastructural strategy for safe autonomous mobile agents." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16052/1/Michaelangelo_Giansiracusa_Thesis.pdf.
Full textGiansiracusa, Michelangelo Antonio. "A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16052/.
Full textKusen, Ema, and Mark Strembeck. "Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing." 2015. http://epub.wu.ac.at/4619/1/SLRprotocolV3.pdf.
Full textKusen, Ema, and Mark Strembeck. "Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing." 2016. http://epub.wu.ac.at/4826/1/SLRprotocoV4.1.pdf.
Full textKusen, Ema, and Mark Strembeck. "Protocol for a systematic literature review of security-related research in ubiquitous computing (updated version)." 2015. http://epub.wu.ac.at/4518/1/SLRprotocol_2015.pdf.
Full textMuthavhine, Khumbelo Difference. "An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effect." Diss., 2018. http://hdl.handle.net/10500/25883.
Full textWei, Sheng-Tsun, and 魏聲尊. "A study of securely associating devices in ubiquitous computing environments." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/47658434310207123779.
Full text