Rozprawy doktorskie na temat „Proxy public key cryptography”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Proxy public key cryptography”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Möller, Bodo. "Public key cryptography theory and practice /." [S.l. : s.n.], 2003. http://elib.tu-darmstadt.de/diss/000372.
Pełny tekst źródłaHan, Yong-Fei. "Fast algorithms for public key cryptography." Thesis, Royal Holloway, University of London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244544.
Pełny tekst źródłaMelin, Tomas, and Tomas Vidhall. "Namecoin as authentication for public-key cryptography." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108413.
Pełny tekst źródłaGaubatz, Gunnar. "Tamper-resistant arithmetic for public-key cryptography." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-030107-115645/.
Pełny tekst źródłaWright, Moriah E. "RSA, Public-Key Cryptography, and Authentication Protocols." Youngstown State University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1339297480.
Pełny tekst źródłaHeindl, Raymond A. "New directions in multivariate public key cryptography." Connect to this title online, 2009. http://etd.lib.clemson.edu/documents/1247508584/.
Pełny tekst źródłaMcIvor, C. "Algorithms and silicon architectures for public-key cryptography." Thesis, Queen's University Belfast, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.419513.
Pełny tekst źródłaFerradi, Houda. "Integrity, authentication and confidentiality in public-key cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE045/document.
Pełny tekst źródłaHettinger, Christopher James. "A New Public-Key Cryptosystem." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5492.
Pełny tekst źródłaGjøsteen, Kristian. "Subgroup membership problems and public key cryptosystems." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-128.
Pełny tekst źródłaPabbuleti, Krishna Chaitanya. "Performance Optimization of Public Key Cryptography on Embedded Platforms." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/48120.
Pełny tekst źródłaMagnusson, Olof, and Mats Hurtig. "Post-Quantum Public Key Cryptography for the Internet of Things." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40459.
Pełny tekst źródłaSantilli, Giordano. "An investigation on Integer Factorization applied to Public Key Cryptography." Doctoral thesis, Università degli studi di Trento, 2019. https://hdl.handle.net/11572/369253.
Pełny tekst źródłaSantilli, Giordano. "An investigation on Integer Factorization applied to Public Key Cryptography." Doctoral thesis, University of Trento, 2019. http://eprints-phd.biblio.unitn.it/3811/1/tesi_Santilli.pdf.
Pełny tekst źródłaQuaglia, Elizabeth. "Anonymity and time in public-key encryption." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/.
Pełny tekst źródłaWang, Ronghua. "Secure and efficient use of public key cryptography in sensor networks." Related electronic resource:, 2007. http://proquest.umi.com/pqdweb?did=1367854361&sid=1&Fmt=2&clientId=3739&RQT=309&VName=PQD.
Pełny tekst źródłaAl, Khulaif Husain H. "Public-key cryptography security-based analysis of the underlying intractable problems." Thesis, University of Colorado at Denver, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1549537.
Pełny tekst źródłaNuß, Anja [Verfasser], and Peter [Akademischer Betreuer] Hauck. "On Group Based Public Key Cryptography / Anja Nuß ; Betreuer: Peter Hauck." Tübingen : Universitätsbibliothek Tübingen, 2012. http://d-nb.info/1162700033/34.
Pełny tekst źródłaWagner, John G. "Cryptanalysis of Rational Multivariate Public Key Cryptosystems." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1276529072.
Pełny tekst źródłaCimen, Canan. "On The Ntru Public Key Cryptosystem." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12609848/index.pdf.
Pełny tekst źródłaKurnio, Hartono. "Contributions to group key distribution schemes." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.103409/index.html.
Pełny tekst źródłaPhillips, Braden Jace. "An optimised implementation of public-key cryptography for a smart-card processor." Title page, contents and abstract only, 2000. http://web4.library.adelaide.edu.au/theses/09PH/09php5578.pdf.
Pełny tekst źródłaNguyen, Phong. "Public-key cryptography : a hardware implementation and novel neural network-based approach." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/24018.
Pełny tekst źródłaAthanasopoulos, Vasileios D. "Design and development of a web-based DOD PKI common access card (CAC) instructional tool /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FAthanasopoulos.pdf.
Pełny tekst źródłaEisenbarth, Thomas. "Cryptography and cryptanalysis for embedded systems." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/1000474909/04.
Pełny tekst źródłaXiong, Hao, and 熊昊. "Leakage resilient cryptographic scheme and GPU-based pairing operation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/195962.
Pełny tekst źródłaWilhelm, Kyle. "Aspects of hardware methodologies for the NTRU public-key cryptosystem /." Online version of thesis, 2008. http://hdl.handle.net/1850/7774.
Pełny tekst źródłaAmbers, Vanessa P. Kelly Amanda M. "Installation, configuration and operational testing of a PKI certificate server and its supporting services /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FAmbers.pdf.
Pełny tekst źródłaJarvis, Katherine. "NTRU over the Eisenstein Integers." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/19862.
Pełny tekst źródłaTaber, Michael S. "Distributed pre-computation for a cryptanalytic time-memory trade-off /." Online version of thesis, 2008. http://hdl.handle.net/1850/7805.
Pełny tekst źródłaThangavel, Jayakumar. "Digital Signature : Comparative study of its usage in developed and developing countries." Thesis, Uppsala universitet, Informationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-217960.
Pełny tekst źródłaMarček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.
Pełny tekst źródłaGaubatz, Gunnar. "Versatile Montgomery Multiplier Architectures." Digital WPI, 2002. https://digitalcommons.wpi.edu/etd-theses/538.
Pełny tekst źródłaÇağrıcı, Gökhan Koltuksuz Ahmet. "An analysis of key generation efficiency of rsa cryptos ystem in distributed environments/." [s.l.]: [s.n.], 2005. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000406.pdf.
Pełny tekst źródłaMacMichael, John L. "A survey and security strength classification of PKI certificate revocation management implementations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FMacMichael.pdf.
Pełny tekst źródłaKwok, Hon-man Sammy, and 郭漢文. "A scalable and secure networking paradigm using identity-based cryptography." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971713.
Pełny tekst źródłaPan, Jiaxin [Verfasser], Eike [Gutachter] Kiltz, and Tibor [Gutachter] Jager. "Improved security proofs and constructions for public-key cryptography / Jiaxin Pan ; Gutachter: Eike Kiltz, Tibor Jager." Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/1114497045/34.
Pełny tekst źródłaAlzahrani, Naif Saeed. "A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games." PDXScholar, 2019. https://pdxscholar.library.pdx.edu/open_access_etds/5038.
Pełny tekst źródłaBommireddipalli, Nithesh Venkata Ramana Surya. "Tutorial on Elliptic Curve Arithmetic and Introduction to Elliptic Curve Cryptography (ECC)." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1511866832906148.
Pełny tekst źródłaRen, Ai. "Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equation." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1558364211159262.
Pełny tekst źródłaBaek, Joonsang 1973. "Construction and formal security analysis of cryptographic schemes in the public key setting." Monash University, School of Network Computing, 2004. http://arrow.monash.edu.au/hdl/1959.1/5243.
Pełny tekst źródłaVarga, Ondrej. "Efektivní schémata digitálních podpisů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219303.
Pełny tekst źródłaShahandashti, Siamak Fayyaz. "Contributions to secure and privacy-preserving use of electronic credentials." School of Computer Science and Software Engineering - Faculty of Informatics, 2009. http://ro.uow.edu.au/theses/3036.
Pełny tekst źródłaAthanasopoulos, Vasileios D. "Design and development of a web-based DOD PKI common access card (CAC) instruction tool." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1714.
Pełny tekst źródłaChow, Sze-ming Sherman. "Forward security from bilinear pairings signcryption and threshold signature /." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B30679424.
Pełny tekst źródłaCheung, Lai-sze, and 張麗詩. "Delegation of rights using PKI-based components." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29973053.
Pełny tekst źródłaChow, Sze-ming Sherman, and 周斯明. "Forward security from bilinear pairings: signcryption and threshold signature." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30679424.
Pełny tekst źródłaGo, Hiu-wing, and 吳曉頴. "Forward security and certificate management in mobile AD Hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30331080.
Pełny tekst źródłaKlembalski, Katharina. "Cryptography and number theory in the classroom -- Contribution of cryptography to mathematics teaching." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-80390.
Pełny tekst źródłaO'Rourke, Colleen Marie. "Efficient NTRU implementations." Link to electronic thesis, 2002. http://www.wpi.edu/Pubs/ETD/Available/etd-0430102-111906.
Pełny tekst źródła