Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Florida" +contributor:("TRAYNOR,PATRICK"). Showing records 1 – 3 of 3 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Florida

1. Mood, Benjamin R. Systems and Compiler-Based Techniques for Mobile-Optimized Secure Function Evaluation.

Degree: PhD, Computer Science - Computer and Information Science and Engineering, 2016, University of Florida

Secure function evaluation (SFE), which allows multiple parties to compute a function on private data while maintaining the privacy of each user's data, is a solution to the problem of how mobile phone users can use sensitive data in applications without revealing the sensitive data to application servers. Advisors/Committee Members: BUTLER,KEVIN (committee chair), TRAYNOR,PATRICK (committee member), CHEN,SHIGANG (committee member), FANG,YUGUANG (committee member).

Subjects/Keywords: Bandwidth; Compilers; Cryptography; Data encryption; Data security; Frigates; Mobile devices; Outsourcing; Personnel evaluation; Simulations; cryptography  – security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mood, B. R. (2016). Systems and Compiler-Based Techniques for Mobile-Optimized Secure Function Evaluation. (Doctoral Dissertation). University of Florida. Retrieved from http://ufdc.ufl.edu/UFE0049754

Chicago Manual of Style (16th Edition):

Mood, Benjamin R. “Systems and Compiler-Based Techniques for Mobile-Optimized Secure Function Evaluation.” 2016. Doctoral Dissertation, University of Florida. Accessed October 22, 2019. http://ufdc.ufl.edu/UFE0049754.

MLA Handbook (7th Edition):

Mood, Benjamin R. “Systems and Compiler-Based Techniques for Mobile-Optimized Secure Function Evaluation.” 2016. Web. 22 Oct 2019.

Vancouver:

Mood BR. Systems and Compiler-Based Techniques for Mobile-Optimized Secure Function Evaluation. [Internet] [Doctoral dissertation]. University of Florida; 2016. [cited 2019 Oct 22]. Available from: http://ufdc.ufl.edu/UFE0049754.

Council of Science Editors:

Mood BR. Systems and Compiler-Based Techniques for Mobile-Optimized Secure Function Evaluation. [Doctoral Dissertation]. University of Florida; 2016. Available from: http://ufdc.ufl.edu/UFE0049754


University of Florida

2. Reaves, Bradley G. Authentication Techniques for Heterogeneous Telephone Networks.

Degree: PhD, Computer Engineering - Computer and Information Science and Engineering, 2017, University of Florida

The global telephone network is relied upon daily by billions worldwide for reliable communications. Beyond their use for communications, telephones are being used as a solution to identity users on Internet because almost every person globally has at least one phone number. Unfortunately, telephones are also plagued with fraud and abuse, making this use and many others insecure. This abuse is ultimately caused by the fact that Advisors/Committee Members: TRAYNOR,PATRICK (committee chair), WILSON,JOSEPH N (committee member), SHRIMPTON,THOMAS (committee member), FORTE,DOMENIC J (committee member).

Subjects/Keywords: authentication  – computersecurity  – telephone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reaves, B. G. (2017). Authentication Techniques for Heterogeneous Telephone Networks. (Doctoral Dissertation). University of Florida. Retrieved from http://ufdc.ufl.edu/UFE0051506

Chicago Manual of Style (16th Edition):

Reaves, Bradley G. “Authentication Techniques for Heterogeneous Telephone Networks.” 2017. Doctoral Dissertation, University of Florida. Accessed October 22, 2019. http://ufdc.ufl.edu/UFE0051506.

MLA Handbook (7th Edition):

Reaves, Bradley G. “Authentication Techniques for Heterogeneous Telephone Networks.” 2017. Web. 22 Oct 2019.

Vancouver:

Reaves BG. Authentication Techniques for Heterogeneous Telephone Networks. [Internet] [Doctoral dissertation]. University of Florida; 2017. [cited 2019 Oct 22]. Available from: http://ufdc.ufl.edu/UFE0051506.

Council of Science Editors:

Reaves BG. Authentication Techniques for Heterogeneous Telephone Networks. [Doctoral Dissertation]. University of Florida; 2017. Available from: http://ufdc.ufl.edu/UFE0051506


University of Florida

3. Bates, Adam M. Designing and Leveraging Trustworthy Provenance-Aware Architectures.

Degree: PhD, Computer Science - Computer and Information Science and Engineering, 2016, University of Florida

Subjects/Keywords: cybersecurity; provenance; security; systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bates, A. M. (2016). Designing and Leveraging Trustworthy Provenance-Aware Architectures. (Doctoral Dissertation). University of Florida. Retrieved from http://ufdc.ufl.edu/UFE0049928

Chicago Manual of Style (16th Edition):

Bates, Adam M. “Designing and Leveraging Trustworthy Provenance-Aware Architectures.” 2016. Doctoral Dissertation, University of Florida. Accessed October 22, 2019. http://ufdc.ufl.edu/UFE0049928.

MLA Handbook (7th Edition):

Bates, Adam M. “Designing and Leveraging Trustworthy Provenance-Aware Architectures.” 2016. Web. 22 Oct 2019.

Vancouver:

Bates AM. Designing and Leveraging Trustworthy Provenance-Aware Architectures. [Internet] [Doctoral dissertation]. University of Florida; 2016. [cited 2019 Oct 22]. Available from: http://ufdc.ufl.edu/UFE0049928.

Council of Science Editors:

Bates AM. Designing and Leveraging Trustworthy Provenance-Aware Architectures. [Doctoral Dissertation]. University of Florida; 2016. Available from: http://ufdc.ufl.edu/UFE0049928

.