Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Oklahoma State University" +contributor:("Toulouse, Michel"). Showing records 1 – 12 of 12 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Oklahoma State University

1. Akshay, Antony. Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol.

Degree: Computer Science, 2014, Oklahoma State University

 The current standards for wireless security are WPA and its revised version WPA2 (IEEE 802.11i). At the basis of both of these is the WEP… (more)

Subjects/Keywords: 4-way handshake; blom's scheme; primitive pythagorean triples

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akshay, A. (2014). Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/14685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Akshay, Antony. “Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol.” 2014. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/14685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Akshay, Antony. “Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol.” 2014. Web. 23 Oct 2019.

Vancouver:

Akshay A. Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol. [Internet] [Thesis]. Oklahoma State University; 2014. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/14685.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Akshay A. Using Primitive Pythagorean Triples and the Blom's Scheme in the 4-way Handshake Wireless Security Protocol. [Thesis]. Oklahoma State University; 2014. Available from: http://hdl.handle.net/11244/14685

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

2. Chandra, Bipul. Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks.

Degree: Computer Science Department, 2011, Oklahoma State University

 Ad-Hoc Mobile Wireless Network (MANETs) have emerged and evolved in many forms. MANETs are rapidly gaining popularity because they do not rely on a pre… (more)

Subjects/Keywords: adhoc network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chandra, B. (2011). Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chandra, Bipul. “Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks.” 2011. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chandra, Bipul. “Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks.” 2011. Web. 23 Oct 2019.

Vancouver:

Chandra B. Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chandra B. Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

3. Dasari, Thrishukanth. Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments.

Degree: Computer Science Department, 2011, Oklahoma State University

 With the proliferation of sensors and actuators in today's world, we envisage the world as an inter-connected network of millions of Sensing and Actuating resources… (more)

Subjects/Keywords: actuators; resource allocation; sanet; sensors

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dasari, T. (2011). Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dasari, Thrishukanth. “Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments.” 2011. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dasari, Thrishukanth. “Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments.” 2011. Web. 23 Oct 2019.

Vancouver:

Dasari T. Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dasari T. Sensing and Actuating Tasks as Services and Its Quality of Services in Large Clustered Environments. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

4. Dhanapal, Naveen Raj. Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System.

Degree: Computer Science Department, 2012, Oklahoma State University

 The general scope of our work is to propose an architecture to integrate the healthcare cloud with wireless sensor network (WSN) technology through smart phones.… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dhanapal, N. R. (2012). Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dhanapal, Naveen Raj. “Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System.” 2012. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dhanapal, Naveen Raj. “Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System.” 2012. Web. 23 Oct 2019.

Vancouver:

Dhanapal NR. Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System. [Internet] [Thesis]. Oklahoma State University; 2012. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dhanapal NR. Architectural Approach for the Integration of Wireless Sensor Networks with Cloud Computing for a Secure Healthcare System. [Thesis]. Oklahoma State University; 2012. Available from: http://hdl.handle.net/11244/8145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

5. Koskei, Jordan Kiprop. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.

Degree: Computer Science Department, 2011, Oklahoma State University

 Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high level intentions. Understanding an intruder's intention greatly enhances network security as it… (more)

Subjects/Keywords: intrusion detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koskei, J. K. (2011). Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Web. 23 Oct 2019.

Vancouver:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

6. Yashwanth, Kothapalli. Primitive Pythagorean Triples in Key Management of Sensor Networks.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis deals with a new approach to key establishment in wireless sensor networks where the nodes have limited memory and communication capabilities. Primitive Pythagorean… (more)

Subjects/Keywords: primitive pythogerean triples

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yashwanth, K. (2011). Primitive Pythagorean Triples in Key Management of Sensor Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8185

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yashwanth, Kothapalli. “Primitive Pythagorean Triples in Key Management of Sensor Networks.” 2011. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8185.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yashwanth, Kothapalli. “Primitive Pythagorean Triples in Key Management of Sensor Networks.” 2011. Web. 23 Oct 2019.

Vancouver:

Yashwanth K. Primitive Pythagorean Triples in Key Management of Sensor Networks. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8185.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yashwanth K. Primitive Pythagorean Triples in Key Management of Sensor Networks. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8185

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

7. Kuruvada, Praveen. Memory Storage in a Variable Threshold Artificial Neural Network.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis is concerned with the problem of memory storage in a feedback neural network. A new learning approach has been developed that assigns variable… (more)

Subjects/Keywords: learning; variable threshold

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuruvada, P. (2011). Memory Storage in a Variable Threshold Artificial Neural Network. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8191

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuruvada, Praveen. “Memory Storage in a Variable Threshold Artificial Neural Network.” 2011. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8191.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuruvada, Praveen. “Memory Storage in a Variable Threshold Artificial Neural Network.” 2011. Web. 23 Oct 2019.

Vancouver:

Kuruvada P. Memory Storage in a Variable Threshold Artificial Neural Network. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8191.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuruvada P. Memory Storage in a Variable Threshold Artificial Neural Network. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8191

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

8. Laddha, Prerana Rani. Increasing the Capacity of a B-matrix Neural Networks.

Degree: Computer Science Department, 2011, Oklahoma State University

 In an effort to create computing structures that are as efficient as the brain at cognitive tasks, interconnected artificial neurons are used in cognitive science… (more)

Subjects/Keywords: b- matrix; network; neural

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laddha, P. R. (2011). Increasing the Capacity of a B-matrix Neural Networks. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8192

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Laddha, Prerana Rani. “Increasing the Capacity of a B-matrix Neural Networks.” 2011. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8192.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Laddha, Prerana Rani. “Increasing the Capacity of a B-matrix Neural Networks.” 2011. Web. 23 Oct 2019.

Vancouver:

Laddha PR. Increasing the Capacity of a B-matrix Neural Networks. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8192.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Laddha PR. Increasing the Capacity of a B-matrix Neural Networks. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8192

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

9. Lingashetty, Krishna Chaithanya. Active Sites Implementation for the B-Matrix Neural Network.

Degree: Computer Science Department, 2010, Oklahoma State University

 This thesis is concerned with the problem of memory recall for the feedback neural network called the B-Matrix network. A new model  – the Active… (more)

Subjects/Keywords: active sites; b matrix; delta rule; memory retrieval

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lingashetty, K. C. (2010). Active Sites Implementation for the B-Matrix Neural Network. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8195

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lingashetty, Krishna Chaithanya. “Active Sites Implementation for the B-Matrix Neural Network.” 2010. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8195.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lingashetty, Krishna Chaithanya. “Active Sites Implementation for the B-Matrix Neural Network.” 2010. Web. 23 Oct 2019.

Vancouver:

Lingashetty KC. Active Sites Implementation for the B-Matrix Neural Network. [Internet] [Thesis]. Oklahoma State University; 2010. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8195.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lingashetty KC. Active Sites Implementation for the B-Matrix Neural Network. [Thesis]. Oklahoma State University; 2010. Available from: http://hdl.handle.net/11244/8195

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

10. Nutalapati, Sravya. Task Resource Probabilistic Scheduling Algorithm.

Degree: Computer Science Department, 2011, Oklahoma State University

 The future of mobile health monitoring combined with cloud computing is expected to see a lot of technological advances. In this thesis we assume that… (more)

Subjects/Keywords: computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nutalapati, S. (2011). Task Resource Probabilistic Scheduling Algorithm. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nutalapati, Sravya. “Task Resource Probabilistic Scheduling Algorithm.” 2011. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nutalapati, Sravya. “Task Resource Probabilistic Scheduling Algorithm.” 2011. Web. 23 Oct 2019.

Vancouver:

Nutalapati S. Task Resource Probabilistic Scheduling Algorithm. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nutalapati S. Task Resource Probabilistic Scheduling Algorithm. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

11. Peruru,l Sravanthi. Reliable and Scalable Addressing Scheme for Data Distribution.

Degree: Computer Science Department, 2010, Oklahoma State University

 A central problem faced in distributed data storage and in peer to peer applications is the efficient location of the node where the requested data… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sravanthi, P. (2010). Reliable and Scalable Addressing Scheme for Data Distribution. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8222

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sravanthi, Peruru,l. “Reliable and Scalable Addressing Scheme for Data Distribution.” 2010. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8222.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sravanthi, Peruru,l. “Reliable and Scalable Addressing Scheme for Data Distribution.” 2010. Web. 23 Oct 2019.

Vancouver:

Sravanthi P. Reliable and Scalable Addressing Scheme for Data Distribution. [Internet] [Thesis]. Oklahoma State University; 2010. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8222.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sravanthi P. Reliable and Scalable Addressing Scheme for Data Distribution. [Thesis]. Oklahoma State University; 2010. Available from: http://hdl.handle.net/11244/8222

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

12. Pilla, Prashant. Enhancing Data Security by Making Data Disappear in a P2p System.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis describes the problem of securing data by making it disappear after some time limit, making it impossible for it to be recovered by… (more)

Subjects/Keywords: computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pilla, P. (2011). Enhancing Data Security by Making Data Disappear in a P2p System. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pilla, Prashant. “Enhancing Data Security by Making Data Disappear in a P2p System.” 2011. Thesis, Oklahoma State University. Accessed October 23, 2019. http://hdl.handle.net/11244/8223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pilla, Prashant. “Enhancing Data Security by Making Data Disappear in a P2p System.” 2011. Web. 23 Oct 2019.

Vancouver:

Pilla P. Enhancing Data Security by Making Data Disappear in a P2p System. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/11244/8223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pilla P. Enhancing Data Security by Making Data Disappear in a P2p System. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.