Tesi sul tema "Security protocol"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Security protocol".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
O'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Testo completoDowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Testo completoChoi, H. J. "Security protocol design by composition." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597633.
Testo completoGibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Testo completoModesti, Paolo <1966>. "Verified security protocol modeling and implementation with AnBx." Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1234.
Testo completoDobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Testo completoAraya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Testo completoJones, Benjamin Edward. "Improving security in the FDDI protocol." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23700.
Testo completoHsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Testo completoHanna, Youssef. "Verifying sensor network security protocol implementations." [Ames, Iowa : Iowa State University], 2008.
Cerca il testo completoFiring, Tia Helene. "Analysis of the Transport Layer Security protocol." Thesis, Norwegian University of Science and Technology, Department of Mathematical Sciences, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10025.
Testo completoStergiou, Theodore. "Protocol security for third generation telecommunication systems." Thesis, University of Warwick, 2003. http://wrap.warwick.ac.uk/3023/.
Testo completoToth, David. "The Byzantine Agreement Protocol applied to security." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-01125-135622/.
Testo completoAl, Shahri Aied Fayez. "SNAP : a distributed authentication protocol." Thesis, University of Strathclyde, 2003. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21375.
Testo completoBengtsson, Filip, and Matteo Madrusan. "Near Field Communication Security concerns & applicable security in Android." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20996.
Testo completoKullenwall, Jonas. "Study of security aspects for Session Initiation Protocol." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1164.
Testo completoTobler, Benjamin. "A Structured Approach to Network Security Protocol Implementation." Thesis, University of Cape Town, 2005. http://pubs.cs.uct.ac.za/archive/00000281/.
Testo completoChen, Hao. "A Search-Based Framework for Security Protocol Synthesis." Thesis, University of York, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.495440.
Testo completoLasorso, Daniel. "Watershed Security Telemetry Network Protocol for Reliability Assurance." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1258576929.
Testo completoOzan, Orhan. "Denial of service attacks on 802.1X security protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOzan.pdf.
Testo completoMuhammad, Shahabuddin. "EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3086.
Testo completoSINIGAGLIA, FEDERICO. "Security Analysis of Multi-Factor Authentication Security Protocols." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1010670.
Testo completoKhan, Moazzam. "Security metric based risk assessment." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47527.
Testo completoGiancecchi, Nicola. "Analysis and Implementation of the Messaging Layer Security Protocol." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/18467/.
Testo completoWerstén, Bengt. "Implementing the Transport Layer Security Protocol for Embedded Systems." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8767.
Testo completoAl-Jaljouli, Raja Computer Science & Engineering Faculty of Engineering UNSW. "A proposed security protocol for data gathering mobile agents." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23999.
Testo completoHoernecke, Andrew Todd. "Security Integrated Messaging a protocol for secure electronic mail /." [Ames, Iowa : Iowa State University], 2007.
Cerca il testo completoAmoah, Raphael. "Formal security analysis of the DNP3-Secure Authentication Protocol." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93798/1/Raphael_Amoah_Thesis.pdf.
Testo completoLaValley, Jason. "Next Generation RFID Randomization Protocol." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20471.
Testo completoShahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.
Testo completoNinet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.
Testo completoŠafář, Jan. "Návrh zero-knowledge protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237255.
Testo completoKojovic, Ivana. "An automatic protocol composition checker." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19105.
Testo completoDarroca, Gregorio G. "Framework for a Link Layer Packet Filtering (LLPF) security protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA355533.
Testo completoCambazoglu, Volkan. "Protocol, mobility and adversary models for the verification of security." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202017.
Testo completoShu, Guoqiang. "Formal Methods and Tools for Testing Communication Protocol System Security." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1211333211.
Testo completoRaffo, Daniele. "Security schemes for the OLSR protocol for ad hoc networks." Paris 6, 2005. http://www.theses.fr/2005PA066241.
Testo completoMaji, Saurav. "Energy-efficient protocol and hardware for security of implantable devices." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122701.
Testo completoTalkington, Gregory Joshua. "Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.
Testo completoKhalid, Muhammad Adnan, and Qamar Nazir. "Security Issue of BGP in complex Peering and Transit Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2447.
Testo completoRaheem, Ali Hussein. "An integrated security protocol communication scheme for Internet of Things using the Locator/ID Separation Protocol network." Thesis, Middlesex University, 2017. http://eprints.mdx.ac.uk/22173/.
Testo completoVeisllari, Raimena. "Employing Ethernet Multiple Spanning Tree Protocol in an OpMiGua network." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10913.
Testo completoHellsing, Mattias, and Odervall Albin. "Efficient Multi-Core Implementation of the IPsec Encapsulating Security Payload Protocol for a Single Security Association." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151984.
Testo completoLiyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.
Testo completoOndráček, David. "Databáze specifikací bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235438.
Testo completoSifatullah, Bhuiyan Mohammad. "Securing Mobile Payment Protocol based on EMV Standard." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121512.
Testo completoGeorgiades, Andrew. "A security protocol for authentication of binding updates in Mobile IPv6." Thesis, Middlesex University, 2011. http://eprints.mdx.ac.uk/7955/.
Testo completoLightfoot, Leonard E. "An energy efficient link-layer security protocol for wireless sensor networks." Diss., Connect to online resource - MSU authorized users, 2006.
Cerca il testo completoAbdelmajid, Nabih T. "Innovative Location Based Scheme for Internet Security Protocol. A proposed Location Based Scheme N-Kerberos Security Protocol Using Intelligent Logic of Believes, Particularly by Modified BAN Logic." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5270.
Testo completoChen, Bangdao. "Using human interactive security protocols to secure payments." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3.
Testo completo