Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Colorado" +contributor:("John Black"). Showing records 1 – 9 of 9 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Colorado

1. Beach, Aaron. Anonymity in Socio-Digital Systems.

Degree: PhD, Computer Science, 2011, University of Colorado

  Social data is particularly interesting to anonymity research due to its personal nature and recent increase in occurrence and usage. Despite the personal nature… (more)

Subjects/Keywords: Theory and Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beach, A. (2011). Anonymity in Socio-Digital Systems. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/23

Chicago Manual of Style (16th Edition):

Beach, Aaron. “Anonymity in Socio-Digital Systems.” 2011. Doctoral Dissertation, University of Colorado. Accessed October 22, 2019. http://scholar.colorado.edu/csci_gradetds/23.

MLA Handbook (7th Edition):

Beach, Aaron. “Anonymity in Socio-Digital Systems.” 2011. Web. 22 Oct 2019.

Vancouver:

Beach A. Anonymity in Socio-Digital Systems. [Internet] [Doctoral dissertation]. University of Colorado; 2011. [cited 2019 Oct 22]. Available from: http://scholar.colorado.edu/csci_gradetds/23.

Council of Science Editors:

Beach A. Anonymity in Socio-Digital Systems. [Doctoral Dissertation]. University of Colorado; 2011. Available from: http://scholar.colorado.edu/csci_gradetds/23


University of Colorado

2. Tafoya, Carlos Jerome. Visual Assembly and Analysis of Cryptographic Ciphers.

Degree: MS, Computer Science, 2011, University of Colorado

  Cryptography can be viewed as the science of information hiding. One key primitive of cryptography is the cipher. In order to assemble and analyze… (more)

Subjects/Keywords: Cipher; Visual Programming; Computer Sciences; Programming Languages and Compilers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tafoya, C. J. (2011). Visual Assembly and Analysis of Cryptographic Ciphers. (Masters Thesis). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/24

Chicago Manual of Style (16th Edition):

Tafoya, Carlos Jerome. “Visual Assembly and Analysis of Cryptographic Ciphers.” 2011. Masters Thesis, University of Colorado. Accessed October 22, 2019. http://scholar.colorado.edu/csci_gradetds/24.

MLA Handbook (7th Edition):

Tafoya, Carlos Jerome. “Visual Assembly and Analysis of Cryptographic Ciphers.” 2011. Web. 22 Oct 2019.

Vancouver:

Tafoya CJ. Visual Assembly and Analysis of Cryptographic Ciphers. [Internet] [Masters thesis]. University of Colorado; 2011. [cited 2019 Oct 22]. Available from: http://scholar.colorado.edu/csci_gradetds/24.

Council of Science Editors:

Tafoya CJ. Visual Assembly and Analysis of Cryptographic Ciphers. [Masters Thesis]. University of Colorado; 2011. Available from: http://scholar.colorado.edu/csci_gradetds/24


University of Colorado

3. Sayler, Andy. Custos: A Flexibly Secure Key-Value Storage Platform.

Degree: MS, 2013, University of Colorado

  The magnitude of the digital data we create, store, and interact with on a daily basis is rapidly increasing. Simultaneously, we are demanding increasingly… (more)

Subjects/Keywords: Cloud Services; Computer Security; Encryption; Key Management; Key Storage as a Service; Secret Storage; Computer Sciences; Data Storage Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sayler, A. (2013). Custos: A Flexibly Secure Key-Value Storage Platform. (Masters Thesis). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/80

Chicago Manual of Style (16th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Masters Thesis, University of Colorado. Accessed October 22, 2019. http://scholar.colorado.edu/csci_gradetds/80.

MLA Handbook (7th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Web. 22 Oct 2019.

Vancouver:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Internet] [Masters thesis]. University of Colorado; 2013. [cited 2019 Oct 22]. Available from: http://scholar.colorado.edu/csci_gradetds/80.

Council of Science Editors:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Masters Thesis]. University of Colorado; 2013. Available from: http://scholar.colorado.edu/csci_gradetds/80


University of Colorado

4. Monaco, Matthew Lawrence. A Filesystem Abstraction for Multiple Actors in a Distributed Software Defined Network.

Degree: MS, Computer Science, 2013, University of Colorado

  Traditional networks are plagued with problems ranging from complexity to proprietary lock-in. This has led to environment in which human error is a major… (more)

Subjects/Keywords: operating systems; software defined networking; filesystem; Yanc; Computer Sciences; OS and Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Monaco, M. L. (2013). A Filesystem Abstraction for Multiple Actors in a Distributed Software Defined Network. (Masters Thesis). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/81

Chicago Manual of Style (16th Edition):

Monaco, Matthew Lawrence. “A Filesystem Abstraction for Multiple Actors in a Distributed Software Defined Network.” 2013. Masters Thesis, University of Colorado. Accessed October 22, 2019. http://scholar.colorado.edu/csci_gradetds/81.

MLA Handbook (7th Edition):

Monaco, Matthew Lawrence. “A Filesystem Abstraction for Multiple Actors in a Distributed Software Defined Network.” 2013. Web. 22 Oct 2019.

Vancouver:

Monaco ML. A Filesystem Abstraction for Multiple Actors in a Distributed Software Defined Network. [Internet] [Masters thesis]. University of Colorado; 2013. [cited 2019 Oct 22]. Available from: http://scholar.colorado.edu/csci_gradetds/81.

Council of Science Editors:

Monaco ML. A Filesystem Abstraction for Multiple Actors in a Distributed Software Defined Network. [Masters Thesis]. University of Colorado; 2013. Available from: http://scholar.colorado.edu/csci_gradetds/81


University of Colorado

5. Mahdian, Alireza. Towards the Next Generation of Online Social Networks.

Degree: PhD, Computer Science, 2012, University of Colorado

  This thesis considers the design of a social network that addresses the shortcomings of the existing ones, and identifies user privacy, security, and service… (more)

Subjects/Keywords: Distributed; Peer to Peer; Privacy; Secure; Social Networks; Computer Sciences; Information Security; Social Media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahdian, A. (2012). Towards the Next Generation of Online Social Networks. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/48

Chicago Manual of Style (16th Edition):

Mahdian, Alireza. “Towards the Next Generation of Online Social Networks.” 2012. Doctoral Dissertation, University of Colorado. Accessed October 22, 2019. http://scholar.colorado.edu/csci_gradetds/48.

MLA Handbook (7th Edition):

Mahdian, Alireza. “Towards the Next Generation of Online Social Networks.” 2012. Web. 22 Oct 2019.

Vancouver:

Mahdian A. Towards the Next Generation of Online Social Networks. [Internet] [Doctoral dissertation]. University of Colorado; 2012. [cited 2019 Oct 22]. Available from: http://scholar.colorado.edu/csci_gradetds/48.

Council of Science Editors:

Mahdian A. Towards the Next Generation of Online Social Networks. [Doctoral Dissertation]. University of Colorado; 2012. Available from: http://scholar.colorado.edu/csci_gradetds/48


University of Colorado

6. Dixon, Bryan Charles. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.

Degree: PhD, Computer Science, 2013, University of Colorado

  In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored… (more)

Subjects/Keywords: Mobile Security; Security; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dixon, B. C. (2013). Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/69

Chicago Manual of Style (16th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Doctoral Dissertation, University of Colorado. Accessed October 22, 2019. http://scholar.colorado.edu/csci_gradetds/69.

MLA Handbook (7th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Web. 22 Oct 2019.

Vancouver:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Internet] [Doctoral dissertation]. University of Colorado; 2013. [cited 2019 Oct 22]. Available from: http://scholar.colorado.edu/csci_gradetds/69.

Council of Science Editors:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Doctoral Dissertation]. University of Colorado; 2013. Available from: http://scholar.colorado.edu/csci_gradetds/69


University of Colorado

7. Alzabarah, Ali. Towards a Next-Generation Runtime Infrastructure Engine for Configuration Management Systems.

Degree: PhD, Computer Science, 2014, University of Colorado

  A common approach to configuration management is to couple a high-level declarative programming language with a runtime engine. The language is used to specify… (more)

Subjects/Keywords: synchronization; CMS design; CMS architecture; Computer Sciences; Systems Architecture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alzabarah, A. (2014). Towards a Next-Generation Runtime Infrastructure Engine for Configuration Management Systems. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/84

Chicago Manual of Style (16th Edition):

Alzabarah, Ali. “Towards a Next-Generation Runtime Infrastructure Engine for Configuration Management Systems.” 2014. Doctoral Dissertation, University of Colorado. Accessed October 22, 2019. http://scholar.colorado.edu/csci_gradetds/84.

MLA Handbook (7th Edition):

Alzabarah, Ali. “Towards a Next-Generation Runtime Infrastructure Engine for Configuration Management Systems.” 2014. Web. 22 Oct 2019.

Vancouver:

Alzabarah A. Towards a Next-Generation Runtime Infrastructure Engine for Configuration Management Systems. [Internet] [Doctoral dissertation]. University of Colorado; 2014. [cited 2019 Oct 22]. Available from: http://scholar.colorado.edu/csci_gradetds/84.

Council of Science Editors:

Alzabarah A. Towards a Next-Generation Runtime Infrastructure Engine for Configuration Management Systems. [Doctoral Dissertation]. University of Colorado; 2014. Available from: http://scholar.colorado.edu/csci_gradetds/84


University of Colorado

8. Sayler, Andy Jackson. Securing Secrets and Managing Trust in Modern Computing Applications.

Degree: PhD, Computer Science, 2016, University of Colorado

  The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous… (more)

Subjects/Keywords: Cryptography; Encryption; Secret Storage; Secret Storage as a Service; Security; Service Oriented Architecture; Computer Sciences; Public Policy; Science and Technology Policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sayler, A. J. (2016). Securing Secrets and Managing Trust in Modern Computing Applications. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/112

Chicago Manual of Style (16th Edition):

Sayler, Andy Jackson. “Securing Secrets and Managing Trust in Modern Computing Applications.” 2016. Doctoral Dissertation, University of Colorado. Accessed October 22, 2019. http://scholar.colorado.edu/csci_gradetds/112.

MLA Handbook (7th Edition):

Sayler, Andy Jackson. “Securing Secrets and Managing Trust in Modern Computing Applications.” 2016. Web. 22 Oct 2019.

Vancouver:

Sayler AJ. Securing Secrets and Managing Trust in Modern Computing Applications. [Internet] [Doctoral dissertation]. University of Colorado; 2016. [cited 2019 Oct 22]. Available from: http://scholar.colorado.edu/csci_gradetds/112.

Council of Science Editors:

Sayler AJ. Securing Secrets and Managing Trust in Modern Computing Applications. [Doctoral Dissertation]. University of Colorado; 2016. Available from: http://scholar.colorado.edu/csci_gradetds/112


University of Colorado

9. Nishikawa, Jared. Applications of Cryptographic Hash Functions.

Degree: PhD, Mathematics, 2016, University of Colorado

  This is a cryptography thesis, and the focus is on applications of cryptographic hash functions. Hash functions, as a cryptographic primitive, are ubiquitous in… (more)

Subjects/Keywords: security; encryption; anonymity; Computer Sciences; Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nishikawa, J. (2016). Applications of Cryptographic Hash Functions. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/math_gradetds/41

Chicago Manual of Style (16th Edition):

Nishikawa, Jared. “Applications of Cryptographic Hash Functions.” 2016. Doctoral Dissertation, University of Colorado. Accessed October 22, 2019. http://scholar.colorado.edu/math_gradetds/41.

MLA Handbook (7th Edition):

Nishikawa, Jared. “Applications of Cryptographic Hash Functions.” 2016. Web. 22 Oct 2019.

Vancouver:

Nishikawa J. Applications of Cryptographic Hash Functions. [Internet] [Doctoral dissertation]. University of Colorado; 2016. [cited 2019 Oct 22]. Available from: http://scholar.colorado.edu/math_gradetds/41.

Council of Science Editors:

Nishikawa J. Applications of Cryptographic Hash Functions. [Doctoral Dissertation]. University of Colorado; 2016. Available from: http://scholar.colorado.edu/math_gradetds/41

.