Teses / dissertações sobre o tema "Trust by the way of security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Trust by the way of security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.
Urban, Michael Crawford. "Imagined security : collective identification, trust, and the liberal peace." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.
Texto completo da fonteManor, Mike. "The home front : civil rights, American values, and public trust when America is at war /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=cfa77bfd-34c7-403f-9f65-cbb4037fa454&rs=PublishedSearch.
Texto completo da fonteLemaitre, Freddy. "La monnaie comme objet de sûretés." Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020044.
Texto completo da fonteGilberg, Ole Rasmus. "Cloud Security without Trust." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26713.
Texto completo da fonteKarthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.
Texto completo da fonteLeonhard, Julian. "Analog hardware security and trust." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.
Texto completo da fonteBilgic, Ali. "Transcending Europe's immigration security dilemma : security, trust, and hospitality." Thesis, Aberystwyth University, 2010. http://hdl.handle.net/2160/452c3109-1597-4d36-ac4a-7392183a7c1a.
Texto completo da fonteElsalamouny, Ehab M. "Probablistic trust models in network security." Thesis, University of Southampton, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536340.
Texto completo da fonteEl, Salamouny Ehab. "Probabilistic trust models in network security." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/179163/.
Texto completo da fontePoirrier, Alexandre. "Formal Security of Zero Trust Architectures." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAX050.
Texto completo da fonteMorris, Cameron. "Browser-Based Trust Negotiation." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1238.pdf.
Texto completo da fonteAmbrose, William, Samuel Athley, and Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.
Texto completo da fonteMoe, Marie Elisabeth Gaup. "Security, Privacy and Trust in Dynamic Networks." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-5540.
Texto completo da fonteMessaggi, Kaya Monica. "Trust and security risks in mobile banking." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:bccf1f59-70cc-4b67-bf87-bfc7af22880f.
Texto completo da fonteWeissinger, Laurin Benedikt. "Assessment, trust, and cooperation in IT-security." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a1e310e3-023f-4228-8acc-a988af0a0a64.
Texto completo da fonteAlruwaythi, Maryam. "User-Behavior Trust Modeling in Cloud Security." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/31537.
Texto completo da fonteYang, Seokwon. "Security and trust management in collaborative computing." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0002375.
Texto completo da fonteLe, Vinh Thinh. "Security and Trust in Mobile Cloud Computing." Thesis, Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1148/document.
Texto completo da fonteDíaz, Rizo Alán Rodrigo. "Security and Trust for Wireless Integrated Circuits." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS005.
Texto completo da fonteLe, Vinh Thinh. "Security and Trust in Mobile Cloud Computing." Electronic Thesis or Diss., Paris, CNAM, 2017. http://www.theses.fr/2017CNAM1148.
Texto completo da fonteMignard, Cédric. "Le crédit-bailleur mobilier face à la procédure collective du crédit-preneur." Electronic Thesis or Diss., Toulon, 2019. http://www.theses.fr/2019TOUL0127.
Texto completo da fonteCrosby, Garth Valentine. "Trust Based Security Mechanisms for Wireless Sensor Networks." FIU Digital Commons, 2007. http://digitalcommons.fiu.edu/etd/61.
Texto completo da fonteShearer, Charles Dylan. "Assumptions, trust, and names in computer security protocols." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5657.
Texto completo da fonteMustapa, Muslim. "PUF based FPGAs for Hardware Security and Trust." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1436361629.
Texto completo da fonteHan, Weijun. "Trust-based distributed security framework for active networks." Thesis, Loughborough University, 2006. https://dspace.lboro.ac.uk/2134/34945.
Texto completo da fonteChinnam, S. "MULTI-WAY COMMUNICATION SYSTEM." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/443.
Texto completo da fonteFord, Sarah Gordon. "Changing the way the world thinks about computer security." Thesis, Middlesex University, 2006. http://eprints.mdx.ac.uk/7995/.
Texto completo da fonteXia, Ying Han. "Establishing trust in encrypted programs." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24761.
Texto completo da fonteDong, Changyu. "Non-monotonic trust management for distributed systems." Thesis, Imperial College London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505456.
Texto completo da fonteMaijanen, K. (Karri). "Building inter-organizational trust by implementing information security management system:a review from trust building perspective." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201612033197.
Texto completo da fonteDuma, Claudiu. "Security and trust mechanisms for groups in distributed services /." Linköping : Univ, 2005. http://www.bibl.liu.se/liupubl/disp/disp2005/tek979s.pdf.
Texto completo da fontePaillissé, Vilanova Jordi. "Next generation overlay networks : security, trust, and deployment challenges." Doctoral thesis, Universitat Politècnica de Catalunya, 2021. http://hdl.handle.net/10803/672330.
Texto completo da fonteCozzi, Maxime. "Infrared Imaging for Integrated Circuit Trust and Hardware Security." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS046.
Texto completo da fonteDE, BENEDICTIS MARCO. "Security and trust in a Network Functions Virtualisation Infrastructure." Doctoral thesis, Politecnico di Torino, 2020. http://hdl.handle.net/11583/2842509.
Texto completo da fonteYang, Yinan Information Technology & Electrical Engineering Australian Defence Force Academy UNSW. "W3 Trust Model (W3TM): a trust-profiling framework to assess trust and transitivity of trust of web-based services in a heterogeneous web environment." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Information Technology and Electrical Engineering, 2005. http://handle.unsw.edu.au/1959.4/38655.
Texto completo da fonteDean, Kevin. "TrustVoucher: automating trust in websites." Thesis, Kansas State University, 2014. http://hdl.handle.net/2097/17638.
Texto completo da fonteAdeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.
Texto completo da fonteWeyl, Benjamin. "On interdomain security : trust establishment in loosely coupled federated environments /." München : Verl. Dr. Hut, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017084239&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Texto completo da fonteVasileiadis, Alexios. "Security concerns and trust in the adoption of m-commerce." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20140113_131752-55666.
Texto completo da fonteIhsan, M. "A dynamic trust and mutual authentication scheme for MANET security." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/48328/.
Texto completo da fonteMcGinthy, Jason M. "Solutions for Internet of Things Security Challenges: Trust and Authentication." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/91443.
Texto completo da fonteHendrickson, Selim L. Y. Tuğlular Tuğkan. "Web Services Security: A Proposed Architecture For Interdomain Trust Relationship/." [s.l.]: [s.n.], 2006. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000581.pdf.
Texto completo da fonteWeyl, Benjamin. "On interdomain security trust establishment in loosely coupled federated environments." München Verl. Dr. Hut, 2007. http://d-nb.info/992163153/04.
Texto completo da fonteSpazzoli, Rowan. "Mental health and social decision making: How depression alters the way we trust." Master's thesis, Faculty of Commerce, 2019. http://hdl.handle.net/11427/31013.
Texto completo da fontePorter, Paul A. "Trust Negotiation for Open Database Access Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.
Texto completo da fonteJarvis, Ryan D. "Protecting Sensitive Credential Content during Trust Negotiation." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd192.pdf.
Texto completo da fonteVilarinho, Thomas Carlyle. "Trusted secure service design : Enhancing trust with the future sim-cards." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9013.
Texto completo da fonteCorre, Kevin. "User controlled trust and security level of Web real-time communications." Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S029/document.
Texto completo da fonteFarooqi, Norah. "Applying dynamic trust based access control to improve XML databases' security." Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/4468/.
Texto completo da fontePirzada, Asad Amir. "Trust-based routing in pure ad-hoc wireless networks." University of Western Australia. School of Computer Science and Software Engineering, 2007. http://theses.library.uwa.edu.au/adt-WU2007.0193.
Texto completo da fonte