Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:( Public key). Showing records 1 – 30 of 274 total matches.

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Anna University

1. Muthulakshmi A. Key management and Broadcast encryption in multi privileged groups Certain investigations;.

Degree: Key management and Broadcast encryption in multi privileged groups Certain investigations, 2015, Anna University

The rapid progress in the technologies underlying multicast newlinenetworking has led to the development of many group oriented applications newlinesuch as pay per view online… (more)

Subjects/Keywords: Public Key Infrastructure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

A, M. (2015). Key management and Broadcast encryption in multi privileged groups Certain investigations;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/38610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

A, Muthulakshmi. “Key management and Broadcast encryption in multi privileged groups Certain investigations;.” 2015. Thesis, Anna University. Accessed December 06, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/38610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

A, Muthulakshmi. “Key management and Broadcast encryption in multi privileged groups Certain investigations;.” 2015. Web. 06 Dec 2019.

Vancouver:

A M. Key management and Broadcast encryption in multi privileged groups Certain investigations;. [Internet] [Thesis]. Anna University; 2015. [cited 2019 Dec 06]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/38610.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

A M. Key management and Broadcast encryption in multi privileged groups Certain investigations;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/38610

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

2. Ramalatha S. VLSI design of energy efficient high Speed multipliers based on vedic Mathematics;.

Degree: VLSI design of energy efficient high Speed multipliers based on vedic Mathematics, 2014, Anna University

The need for high speed processing has been increasing as a result of newlineexpanding signal processing and cryptography applications To achieve this newlineobjective high speed… (more)

Subjects/Keywords: Montgomery Algorithm; Public key cryptosystems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

S, R. (2014). VLSI design of energy efficient high Speed multipliers based on vedic Mathematics;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/27271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

S, Ramalatha. “VLSI design of energy efficient high Speed multipliers based on vedic Mathematics;.” 2014. Thesis, Anna University. Accessed December 06, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/27271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

S, Ramalatha. “VLSI design of energy efficient high Speed multipliers based on vedic Mathematics;.” 2014. Web. 06 Dec 2019.

Vancouver:

S R. VLSI design of energy efficient high Speed multipliers based on vedic Mathematics;. [Internet] [Thesis]. Anna University; 2014. [cited 2019 Dec 06]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/27271.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

S R. VLSI design of energy efficient high Speed multipliers based on vedic Mathematics;. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/27271

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

3. Xiong, Hao. Leakage resilient cryptographic scheme and GPU-based pairing operation.

Degree: PhD, 2013, University of Hong Kong

Cryptographic schemes are designed to protect the privacy of the users. Numerous schemes have been proposed for different purposes. One important type of schemes is… (more)

Subjects/Keywords: Computer security; Public key cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiong, H. (2013). Leakage resilient cryptographic scheme and GPU-based pairing operation. (Doctoral Dissertation). University of Hong Kong. Retrieved from Xiong, H. [熊昊]. (2013). Leakage resilient cryptographic scheme and GPU-based pairing operation. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5153718 ; http://dx.doi.org/10.5353/th_b5153718 ; http://hdl.handle.net/10722/195962

Chicago Manual of Style (16th Edition):

Xiong, Hao. “Leakage resilient cryptographic scheme and GPU-based pairing operation.” 2013. Doctoral Dissertation, University of Hong Kong. Accessed December 06, 2019. Xiong, H. [熊昊]. (2013). Leakage resilient cryptographic scheme and GPU-based pairing operation. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5153718 ; http://dx.doi.org/10.5353/th_b5153718 ; http://hdl.handle.net/10722/195962.

MLA Handbook (7th Edition):

Xiong, Hao. “Leakage resilient cryptographic scheme and GPU-based pairing operation.” 2013. Web. 06 Dec 2019.

Vancouver:

Xiong H. Leakage resilient cryptographic scheme and GPU-based pairing operation. [Internet] [Doctoral dissertation]. University of Hong Kong; 2013. [cited 2019 Dec 06]. Available from: Xiong, H. [熊昊]. (2013). Leakage resilient cryptographic scheme and GPU-based pairing operation. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5153718 ; http://dx.doi.org/10.5353/th_b5153718 ; http://hdl.handle.net/10722/195962.

Council of Science Editors:

Xiong H. Leakage resilient cryptographic scheme and GPU-based pairing operation. [Doctoral Dissertation]. University of Hong Kong; 2013. Available from: Xiong, H. [熊昊]. (2013). Leakage resilient cryptographic scheme and GPU-based pairing operation. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5153718 ; http://dx.doi.org/10.5353/th_b5153718 ; http://hdl.handle.net/10722/195962

4. Gilbert, Sawyer Perham. AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION.

Degree: 2017, American University

The purpose of this research is to understand the basic principles of public key encryption from a mathematically perspective and identify security flaws in basic… (more)

Subjects/Keywords: ElGamal; Encryption; Public Key; RSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gilbert, S. P. (2017). AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION. (Masters Thesis). American University. Retrieved from http://hdl.handle.net/1961/auislandora:68654

Chicago Manual of Style (16th Edition):

Gilbert, Sawyer Perham. “AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION.” 2017. Masters Thesis, American University. Accessed December 06, 2019. http://hdl.handle.net/1961/auislandora:68654.

MLA Handbook (7th Edition):

Gilbert, Sawyer Perham. “AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION.” 2017. Web. 06 Dec 2019.

Vancouver:

Gilbert SP. AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION. [Internet] [Masters thesis]. American University; 2017. [cited 2019 Dec 06]. Available from: http://hdl.handle.net/1961/auislandora:68654.

Council of Science Editors:

Gilbert SP. AN INTRODUCTION TO CRYPTOGRAPHY RSA, ELGAMAL AND ELLIPTIC CURVE ENCRYPTION. [Masters Thesis]. American University; 2017. Available from: http://hdl.handle.net/1961/auislandora:68654


Queensland University of Technology

5. Djamaludin, Christopher I. Decentralised key management for delay tolerant networks.

Degree: 2016, Queensland University of Technology

Public key authentication is the verification of the identity-public key binding, and is foundational to the security of any network. The contribution of this thesis… (more)

Subjects/Keywords: Delay Tolerant Network; Decentralised; Public Key Infrastructure; Public Key Authentication; Key Management; Key Distribution; Key Revocation; Autonomous; Trust; Reputation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Djamaludin, C. I. (2016). Decentralised key management for delay tolerant networks. (Thesis). Queensland University of Technology. Retrieved from http://eprints.qut.edu.au/94983/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Djamaludin, Christopher I. “Decentralised key management for delay tolerant networks.” 2016. Thesis, Queensland University of Technology. Accessed December 06, 2019. http://eprints.qut.edu.au/94983/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Djamaludin, Christopher I. “Decentralised key management for delay tolerant networks.” 2016. Web. 06 Dec 2019.

Vancouver:

Djamaludin CI. Decentralised key management for delay tolerant networks. [Internet] [Thesis]. Queensland University of Technology; 2016. [cited 2019 Dec 06]. Available from: http://eprints.qut.edu.au/94983/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Djamaludin CI. Decentralised key management for delay tolerant networks. [Thesis]. Queensland University of Technology; 2016. Available from: http://eprints.qut.edu.au/94983/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Wollongong

6. Cui, Hui. Preservation of privacy in public-key cryptography.

Degree: PhD, 2015, University of Wollongong

  This work in this thesis can be divided into two aspects. Firstly, we consider confidentiality and anonymity under a scenario where an untrusted third… (more)

Subjects/Keywords: confidentially; related-key attack security; anonymity; data integrity; public-key cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cui, H. (2015). Preservation of privacy in public-key cryptography. (Doctoral Dissertation). University of Wollongong. Retrieved from 0804 DATA FORMAT ; https://ro.uow.edu.au/theses/4480

Chicago Manual of Style (16th Edition):

Cui, Hui. “Preservation of privacy in public-key cryptography.” 2015. Doctoral Dissertation, University of Wollongong. Accessed December 06, 2019. 0804 DATA FORMAT ; https://ro.uow.edu.au/theses/4480.

MLA Handbook (7th Edition):

Cui, Hui. “Preservation of privacy in public-key cryptography.” 2015. Web. 06 Dec 2019.

Vancouver:

Cui H. Preservation of privacy in public-key cryptography. [Internet] [Doctoral dissertation]. University of Wollongong; 2015. [cited 2019 Dec 06]. Available from: 0804 DATA FORMAT ; https://ro.uow.edu.au/theses/4480.

Council of Science Editors:

Cui H. Preservation of privacy in public-key cryptography. [Doctoral Dissertation]. University of Wollongong; 2015. Available from: 0804 DATA FORMAT ; https://ro.uow.edu.au/theses/4480

7. Kondoh, Shinichiro. Contradictions derived from Bellare-style formalizations of security of public key cryptosystems : 公開鍵暗号系に対するBellareらの安全性定式化から導かれる問題点について; コウカイ カギ アンゴウケイ ニ タイスル Bellareラ ノ アンゼンセイ テイシキカ カラ ミチビカレル モンダイテン ニ ツイテ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: public-key cryptosystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kondoh, S. (n.d.). Contradictions derived from Bellare-style formalizations of security of public key cryptosystems : 公開鍵暗号系に対するBellareらの安全性定式化から導かれる問題点について; コウカイ カギ アンゴウケイ ニ タイスル Bellareラ ノ アンゼンセイ テイシキカ カラ ミチビカレル モンダイテン ニ ツイテ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/1487

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kondoh, Shinichiro. “Contradictions derived from Bellare-style formalizations of security of public key cryptosystems : 公開鍵暗号系に対するBellareらの安全性定式化から導かれる問題点について; コウカイ カギ アンゴウケイ ニ タイスル Bellareラ ノ アンゼンセイ テイシキカ カラ ミチビカレル モンダイテン ニ ツイテ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed December 06, 2019. http://hdl.handle.net/10061/1487.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kondoh, Shinichiro. “Contradictions derived from Bellare-style formalizations of security of public key cryptosystems : 公開鍵暗号系に対するBellareらの安全性定式化から導かれる問題点について; コウカイ カギ アンゴウケイ ニ タイスル Bellareラ ノ アンゼンセイ テイシキカ カラ ミチビカレル モンダイテン ニ ツイテ.” Web. 06 Dec 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Kondoh S. Contradictions derived from Bellare-style formalizations of security of public key cryptosystems : 公開鍵暗号系に対するBellareらの安全性定式化から導かれる問題点について; コウカイ カギ アンゴウケイ ニ タイスル Bellareラ ノ アンゼンセイ テイシキカ カラ ミチビカレル モンダイテン ニ ツイテ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2019 Dec 06]. Available from: http://hdl.handle.net/10061/1487.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Kondoh S. Contradictions derived from Bellare-style formalizations of security of public key cryptosystems : 公開鍵暗号系に対するBellareらの安全性定式化から導かれる問題点について; コウカイ カギ アンゴウケイ ニ タイスル Bellareラ ノ アンゼンセイ テイシキカ カラ ミチビカレル モンダイテン ニ ツイテ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/1487

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

8. Suzuki, Ako. Theoretical classifications of security notions on public-key cryptosystems : 公開鍵暗号における安全性指標の定式化について; コウカイ カギ アンゴウ ニオケル アンゼンセイ シヒョウ ノ テイシキカ ニ ツイテ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: public-key cryptosystems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Suzuki, A. (n.d.). Theoretical classifications of security notions on public-key cryptosystems : 公開鍵暗号における安全性指標の定式化について; コウカイ カギ アンゴウ ニオケル アンゼンセイ シヒョウ ノ テイシキカ ニ ツイテ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/3069

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Suzuki, Ako. “Theoretical classifications of security notions on public-key cryptosystems : 公開鍵暗号における安全性指標の定式化について; コウカイ カギ アンゴウ ニオケル アンゼンセイ シヒョウ ノ テイシキカ ニ ツイテ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed December 06, 2019. http://hdl.handle.net/10061/3069.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Suzuki, Ako. “Theoretical classifications of security notions on public-key cryptosystems : 公開鍵暗号における安全性指標の定式化について; コウカイ カギ アンゴウ ニオケル アンゼンセイ シヒョウ ノ テイシキカ ニ ツイテ.” Web. 06 Dec 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Suzuki A. Theoretical classifications of security notions on public-key cryptosystems : 公開鍵暗号における安全性指標の定式化について; コウカイ カギ アンゴウ ニオケル アンゼンセイ シヒョウ ノ テイシキカ ニ ツイテ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2019 Dec 06]. Available from: http://hdl.handle.net/10061/3069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Suzuki A. Theoretical classifications of security notions on public-key cryptosystems : 公開鍵暗号における安全性指標の定式化について; コウカイ カギ アンゴウ ニオケル アンゼンセイ シヒョウ ノ テイシキカ ニ ツイテ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/3069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Victoria

9. Hajiabadi, Mohammad. Encryption security against key-dependent-message attacks: applications, realizations and separations.

Degree: Department of Computer Science, 2016, University of Victoria

 In this thesis we study the notion of circular security for bit-encryption schemes. Informally speaking, a bit-encryption scheme is circular secure if it remains secure… (more)

Subjects/Keywords: Data encryption (Computer science); Public key cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hajiabadi, M. (2016). Encryption security against key-dependent-message attacks: applications, realizations and separations. (Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/7454

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hajiabadi, Mohammad. “Encryption security against key-dependent-message attacks: applications, realizations and separations.” 2016. Thesis, University of Victoria. Accessed December 06, 2019. http://hdl.handle.net/1828/7454.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hajiabadi, Mohammad. “Encryption security against key-dependent-message attacks: applications, realizations and separations.” 2016. Web. 06 Dec 2019.

Vancouver:

Hajiabadi M. Encryption security against key-dependent-message attacks: applications, realizations and separations. [Internet] [Thesis]. University of Victoria; 2016. [cited 2019 Dec 06]. Available from: http://hdl.handle.net/1828/7454.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hajiabadi M. Encryption security against key-dependent-message attacks: applications, realizations and separations. [Thesis]. University of Victoria; 2016. Available from: http://hdl.handle.net/1828/7454

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Wollongong

10. Ji, Yafu. Oblivious keyword search.

Degree: Master of Computer Science - Research, 2013, University of Wollongong

  The rapid development of information and communication technology has enabled more people to outsource and store their data on the networked databases. However, it… (more)

Subjects/Keywords: obvious; keyword search; public key encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ji, Y. (2013). Oblivious keyword search. (Masters Thesis). University of Wollongong. Retrieved from 0803 COMPUTER SOFTWARE, 0804 DATA FORMAT ; https://ro.uow.edu.au/theses/3737

Chicago Manual of Style (16th Edition):

Ji, Yafu. “Oblivious keyword search.” 2013. Masters Thesis, University of Wollongong. Accessed December 06, 2019. 0803 COMPUTER SOFTWARE, 0804 DATA FORMAT ; https://ro.uow.edu.au/theses/3737.

MLA Handbook (7th Edition):

Ji, Yafu. “Oblivious keyword search.” 2013. Web. 06 Dec 2019.

Vancouver:

Ji Y. Oblivious keyword search. [Internet] [Masters thesis]. University of Wollongong; 2013. [cited 2019 Dec 06]. Available from: 0803 COMPUTER SOFTWARE, 0804 DATA FORMAT ; https://ro.uow.edu.au/theses/3737.

Council of Science Editors:

Ji Y. Oblivious keyword search. [Masters Thesis]. University of Wollongong; 2013. Available from: 0803 COMPUTER SOFTWARE, 0804 DATA FORMAT ; https://ro.uow.edu.au/theses/3737


University of Johannesburg

11. Van den Berg, James Richard. Securing the digital signing process.

Degree: 2010, University of Johannesburg

M.Comm.

Worldwide an increasing amount of legal credibility is being assigned to digital signatures and it is therefore of utmost importance to research and develop… (more)

Subjects/Keywords: Digital signature; Computer security; Public key cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van den Berg, J. R. (2010). Securing the digital signing process. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3109

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van den Berg, James Richard. “Securing the digital signing process.” 2010. Thesis, University of Johannesburg. Accessed December 06, 2019. http://hdl.handle.net/10210/3109.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van den Berg, James Richard. “Securing the digital signing process.” 2010. Web. 06 Dec 2019.

Vancouver:

Van den Berg JR. Securing the digital signing process. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2019 Dec 06]. Available from: http://hdl.handle.net/10210/3109.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van den Berg JR. Securing the digital signing process. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3109

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brigham Young University

12. Hettinger, Christopher James. A New Public-Key Cryptosystem.

Degree: MS, 2014, Brigham Young University

Public key cryptosystems offer important advantages over symmetric methods, but the most important such systems rely on the difficulty of integer factorization (or the related… (more)

Subjects/Keywords: Cryptography; Public Key; Post-Quantum; Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hettinger, C. J. (2014). A New Public-Key Cryptosystem. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=6491&context=etd

Chicago Manual of Style (16th Edition):

Hettinger, Christopher James. “A New Public-Key Cryptosystem.” 2014. Masters Thesis, Brigham Young University. Accessed December 06, 2019. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=6491&context=etd.

MLA Handbook (7th Edition):

Hettinger, Christopher James. “A New Public-Key Cryptosystem.” 2014. Web. 06 Dec 2019.

Vancouver:

Hettinger CJ. A New Public-Key Cryptosystem. [Internet] [Masters thesis]. Brigham Young University; 2014. [cited 2019 Dec 06]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=6491&context=etd.

Council of Science Editors:

Hettinger CJ. A New Public-Key Cryptosystem. [Masters Thesis]. Brigham Young University; 2014. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=6491&context=etd


KTH

13. Sandor, Alexander. Security of dynamic authorisation for IoT through Blockchain technology.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

The use of Internet of Things devices is an integral part of our modern society. Communication with internet of things devices is secured with… (more)

Subjects/Keywords: Blockchain; IoT; Public Key Encryption; Public Key Infrastructure; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sandor, A. (2018). Security of dynamic authorisation for IoT through Blockchain technology. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231868

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sandor, Alexander. “Security of dynamic authorisation for IoT through Blockchain technology.” 2018. Thesis, KTH. Accessed December 06, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231868.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sandor, Alexander. “Security of dynamic authorisation for IoT through Blockchain technology.” 2018. Web. 06 Dec 2019.

Vancouver:

Sandor A. Security of dynamic authorisation for IoT through Blockchain technology. [Internet] [Thesis]. KTH; 2018. [cited 2019 Dec 06]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231868.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sandor A. Security of dynamic authorisation for IoT through Blockchain technology. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231868

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Florida Atlantic University

14. Amento, Brittanney Jaclyn. Message authentication in an identity-based encryption scheme: 1-Key-Encrypt-Then-MAC.

Degree: MS, 2010, Florida Atlantic University

Summary: We present an Identity-Based Encryption scheme, 1-Key-Encrypt-Then-MAC, in which we are able to verify the authenticity of messages using a MAC. We accomplish this… (more)

Subjects/Keywords: Data encryption (Computer science); Public key cryptopgraphy; Public key infrastructure (Computer security)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amento, B. J. (2010). Message authentication in an identity-based encryption scheme: 1-Key-Encrypt-Then-MAC. (Masters Thesis). Florida Atlantic University. Retrieved from http://purl.flvc.org/FAU/2796050

Chicago Manual of Style (16th Edition):

Amento, Brittanney Jaclyn. “Message authentication in an identity-based encryption scheme: 1-Key-Encrypt-Then-MAC.” 2010. Masters Thesis, Florida Atlantic University. Accessed December 06, 2019. http://purl.flvc.org/FAU/2796050.

MLA Handbook (7th Edition):

Amento, Brittanney Jaclyn. “Message authentication in an identity-based encryption scheme: 1-Key-Encrypt-Then-MAC.” 2010. Web. 06 Dec 2019.

Vancouver:

Amento BJ. Message authentication in an identity-based encryption scheme: 1-Key-Encrypt-Then-MAC. [Internet] [Masters thesis]. Florida Atlantic University; 2010. [cited 2019 Dec 06]. Available from: http://purl.flvc.org/FAU/2796050.

Council of Science Editors:

Amento BJ. Message authentication in an identity-based encryption scheme: 1-Key-Encrypt-Then-MAC. [Masters Thesis]. Florida Atlantic University; 2010. Available from: http://purl.flvc.org/FAU/2796050


University of Victoria

15. Bouidani, Maher M. Design and implementation of a blockchain shipping application.

Degree: Department of Electrical and Computer Engineering, 2019, University of Victoria

 The emerging Blockchain technology has the potential to shift the traditional centralized systems to become more flexible, efficient and decentralized. An important area to apply… (more)

Subjects/Keywords: Blockchain; Hyperledger; Public Key; Private Key; Public Key Cryptography; Shipping and Logistics; Blockchain Framework; Hash Function; Consensus; Merkle Tree; RESTful; JavaScript

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bouidani, M. M. (2019). Design and implementation of a blockchain shipping application. (Masters Thesis). University of Victoria. Retrieved from https://dspace.library.uvic.ca//handle/1828/10568

Chicago Manual of Style (16th Edition):

Bouidani, Maher M. “Design and implementation of a blockchain shipping application.” 2019. Masters Thesis, University of Victoria. Accessed December 06, 2019. https://dspace.library.uvic.ca//handle/1828/10568.

MLA Handbook (7th Edition):

Bouidani, Maher M. “Design and implementation of a blockchain shipping application.” 2019. Web. 06 Dec 2019.

Vancouver:

Bouidani MM. Design and implementation of a blockchain shipping application. [Internet] [Masters thesis]. University of Victoria; 2019. [cited 2019 Dec 06]. Available from: https://dspace.library.uvic.ca//handle/1828/10568.

Council of Science Editors:

Bouidani MM. Design and implementation of a blockchain shipping application. [Masters Thesis]. University of Victoria; 2019. Available from: https://dspace.library.uvic.ca//handle/1828/10568

16. Phan, Thi Lan Anh. Using Auxiliary Helper Key in Key Insulated Public Key Encryption : 補助鍵を用いた鍵隔離公開鍵暗号方式.

Degree: 修士(情報理工学), 2017, The University of Tokyo / 東京大学

 To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated public key encryption (KIE), which uses the secure… (more)

Subjects/Keywords: Key Insulated Public Key Encryption; Auxiliary Helper Key

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Phan, T. L. A. (2017). Using Auxiliary Helper Key in Key Insulated Public Key Encryption : 補助鍵を用いた鍵隔離公開鍵暗号方式. (Thesis). The University of Tokyo / 東京大学. Retrieved from http://hdl.handle.net/2261/28808

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Phan, Thi Lan Anh. “Using Auxiliary Helper Key in Key Insulated Public Key Encryption : 補助鍵を用いた鍵隔離公開鍵暗号方式.” 2017. Thesis, The University of Tokyo / 東京大学. Accessed December 06, 2019. http://hdl.handle.net/2261/28808.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Phan, Thi Lan Anh. “Using Auxiliary Helper Key in Key Insulated Public Key Encryption : 補助鍵を用いた鍵隔離公開鍵暗号方式.” 2017. Web. 06 Dec 2019.

Vancouver:

Phan TLA. Using Auxiliary Helper Key in Key Insulated Public Key Encryption : 補助鍵を用いた鍵隔離公開鍵暗号方式. [Internet] [Thesis]. The University of Tokyo / 東京大学; 2017. [cited 2019 Dec 06]. Available from: http://hdl.handle.net/2261/28808.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Phan TLA. Using Auxiliary Helper Key in Key Insulated Public Key Encryption : 補助鍵を用いた鍵隔離公開鍵暗号方式. [Thesis]. The University of Tokyo / 東京大学; 2017. Available from: http://hdl.handle.net/2261/28808

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Rufino, Vilc Queupe. Acordo de chaves criptográficas hierárquico e sem certificado.

Degree: Mestrado, Ciência da Computação, 2009, University of São Paulo

Apresentamos um novo esquema de acordo de chaves criptográficas hierárquico, não Interativo e seguro contra comprometimento de múltiplos nós. Esquemas para Acordo de chaves criptográficas… (more)

Subjects/Keywords: certificateless; chave pública; criptografia; criptography; hierarchy; hierarquia; key agreement; public key; security; segurança; sem certificado

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rufino, V. Q. (2009). Acordo de chaves criptográficas hierárquico e sem certificado. (Masters Thesis). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/45/45134/tde-19122009-213045/ ;

Chicago Manual of Style (16th Edition):

Rufino, Vilc Queupe. “Acordo de chaves criptográficas hierárquico e sem certificado.” 2009. Masters Thesis, University of São Paulo. Accessed December 06, 2019. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-19122009-213045/ ;.

MLA Handbook (7th Edition):

Rufino, Vilc Queupe. “Acordo de chaves criptográficas hierárquico e sem certificado.” 2009. Web. 06 Dec 2019.

Vancouver:

Rufino VQ. Acordo de chaves criptográficas hierárquico e sem certificado. [Internet] [Masters thesis]. University of São Paulo; 2009. [cited 2019 Dec 06]. Available from: http://www.teses.usp.br/teses/disponiveis/45/45134/tde-19122009-213045/ ;.

Council of Science Editors:

Rufino VQ. Acordo de chaves criptográficas hierárquico e sem certificado. [Masters Thesis]. University of São Paulo; 2009. Available from: http://www.teses.usp.br/teses/disponiveis/45/45134/tde-19122009-213045/ ;


Anna University

18. Thangavel T.S. Hash based quantum key two server password authentication for internet system;.

Degree: 2014, Anna University

Internet is the most integral part of our daily life and the people who manages their work with internet like bank transaction, online shopping is… (more)

Subjects/Keywords: Internet; password authentication; Public Key Infrastructure; Secure Socket Layer (SSL); Pseudo Random Key Generation; hash

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

T.S, T. (2014). Hash based quantum key two server password authentication for internet system;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/15212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

T.S, Thangavel. “Hash based quantum key two server password authentication for internet system;.” 2014. Thesis, Anna University. Accessed December 06, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/15212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

T.S, Thangavel. “Hash based quantum key two server password authentication for internet system;.” 2014. Web. 06 Dec 2019.

Vancouver:

T.S T. Hash based quantum key two server password authentication for internet system;. [Internet] [Thesis]. Anna University; 2014. [cited 2019 Dec 06]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/15212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

T.S T. Hash based quantum key two server password authentication for internet system;. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/15212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

19. Shen, Pei Yuan. An efficient public key management regime for vehicular ad hoc networks (VANETS).

Degree: 2011, Queensland University of Technology

 The primary goal of the Vehicular Ad Hoc Network (VANET) is to provide real-time safety-related messages to motorists to enhance road safety. Accessing and disseminating… (more)

Subjects/Keywords: non-certificate-based public key cryptosystem; VANETs; security architecture for VANETs; public file; public key management; PKI

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shen, P. Y. (2011). An efficient public key management regime for vehicular ad hoc networks (VANETS). (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/46231/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shen, Pei Yuan. “An efficient public key management regime for vehicular ad hoc networks (VANETS).” 2011. Thesis, Queensland University of Technology. Accessed December 06, 2019. https://eprints.qut.edu.au/46231/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shen, Pei Yuan. “An efficient public key management regime for vehicular ad hoc networks (VANETS).” 2011. Web. 06 Dec 2019.

Vancouver:

Shen PY. An efficient public key management regime for vehicular ad hoc networks (VANETS). [Internet] [Thesis]. Queensland University of Technology; 2011. [cited 2019 Dec 06]. Available from: https://eprints.qut.edu.au/46231/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shen PY. An efficient public key management regime for vehicular ad hoc networks (VANETS). [Thesis]. Queensland University of Technology; 2011. Available from: https://eprints.qut.edu.au/46231/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universiteit Utrecht

20. Zaker Soltani, S. Improving PKI: Solution analysis in case of CA compromisation.

Degree: 2013, Universiteit Utrecht

 Creating a secure connection on the Internet is made possible through the usage of certificates, binding an entity to its public key. These certificates can… (more)

Subjects/Keywords: Public Key Infrastructure; PKI; Certificate Authority; CA compromisation; Public Key Pinning; Sovereign Keys; Certificate Transparency; Perspectives & Convergence; DANE; and MCS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zaker Soltani, S. (2013). Improving PKI: Solution analysis in case of CA compromisation. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/267288

Chicago Manual of Style (16th Edition):

Zaker Soltani, S. “Improving PKI: Solution analysis in case of CA compromisation.” 2013. Masters Thesis, Universiteit Utrecht. Accessed December 06, 2019. http://dspace.library.uu.nl:8080/handle/1874/267288.

MLA Handbook (7th Edition):

Zaker Soltani, S. “Improving PKI: Solution analysis in case of CA compromisation.” 2013. Web. 06 Dec 2019.

Vancouver:

Zaker Soltani S. Improving PKI: Solution analysis in case of CA compromisation. [Internet] [Masters thesis]. Universiteit Utrecht; 2013. [cited 2019 Dec 06]. Available from: http://dspace.library.uu.nl:8080/handle/1874/267288.

Council of Science Editors:

Zaker Soltani S. Improving PKI: Solution analysis in case of CA compromisation. [Masters Thesis]. Universiteit Utrecht; 2013. Available from: http://dspace.library.uu.nl:8080/handle/1874/267288

21. Vial prado, Francisco. Contributions to design and analysis of Fully Homomorphic Encryption schemes : Contributions à la conception et analyse des schémas de chiffrement complètement homomorphe.

Degree: Docteur es, Informatique, 2017, Paris Saclay

Les schémas de Chiffrement Complètement Homomorphe (FHE) permettent de manipuler des données chiffrées avec grande flexibilité : ils rendent possible l'évaluation de fonctions à travers… (more)

Subjects/Keywords: Cryptographie; Chiffrement complètement homomorphe; Clé publique; Cryptographie à clé publique; Cryptography; Fully homomorphic encryption; Public key; Public-key cryptography; 005.82

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vial prado, F. (2017). Contributions to design and analysis of Fully Homomorphic Encryption schemes : Contributions à la conception et analyse des schémas de chiffrement complètement homomorphe. (Doctoral Dissertation). Paris Saclay. Retrieved from http://www.theses.fr/2017SACLV107

Chicago Manual of Style (16th Edition):

Vial prado, Francisco. “Contributions to design and analysis of Fully Homomorphic Encryption schemes : Contributions à la conception et analyse des schémas de chiffrement complètement homomorphe.” 2017. Doctoral Dissertation, Paris Saclay. Accessed December 06, 2019. http://www.theses.fr/2017SACLV107.

MLA Handbook (7th Edition):

Vial prado, Francisco. “Contributions to design and analysis of Fully Homomorphic Encryption schemes : Contributions à la conception et analyse des schémas de chiffrement complètement homomorphe.” 2017. Web. 06 Dec 2019.

Vancouver:

Vial prado F. Contributions to design and analysis of Fully Homomorphic Encryption schemes : Contributions à la conception et analyse des schémas de chiffrement complètement homomorphe. [Internet] [Doctoral dissertation]. Paris Saclay; 2017. [cited 2019 Dec 06]. Available from: http://www.theses.fr/2017SACLV107.

Council of Science Editors:

Vial prado F. Contributions to design and analysis of Fully Homomorphic Encryption schemes : Contributions à la conception et analyse des schémas de chiffrement complètement homomorphe. [Doctoral Dissertation]. Paris Saclay; 2017. Available from: http://www.theses.fr/2017SACLV107


Florida Atlantic University

22. Glass, Stephen C. Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks.

Degree: 2017, Florida Atlantic University

Summary: With the issuance of the Notice of Proposed Rule Making (NPRM) for Vehicle to Vehicle (V2V) communications by the United States National Highway Tra… (more)

Subjects/Keywords: Dissertations, Academic  – Florida Atlantic University; Public key infrastructure (Computer security); Privacy.; Cache memory.; Public key infrastructure (Computer security).

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Glass, S. C. (2017). Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks. (Thesis). Florida Atlantic University. Retrieved from http://purl.flvc.org/fau/fd/FA00004975 ; (URL) http://purl.flvc.org/fau/fd/FA00004965

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Glass, Stephen C. “Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks.” 2017. Thesis, Florida Atlantic University. Accessed December 06, 2019. http://purl.flvc.org/fau/fd/FA00004975 ; (URL) http://purl.flvc.org/fau/fd/FA00004965.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Glass, Stephen C. “Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks.” 2017. Web. 06 Dec 2019.

Vancouver:

Glass SC. Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks. [Internet] [Thesis]. Florida Atlantic University; 2017. [cited 2019 Dec 06]. Available from: http://purl.flvc.org/fau/fd/FA00004975 ; (URL) http://purl.flvc.org/fau/fd/FA00004965.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Glass SC. Improving Privacy With Intelligent Cooperative Caching In Vehicular Ad Hoc Networks. [Thesis]. Florida Atlantic University; 2017. Available from: http://purl.flvc.org/fau/fd/FA00004975 ; (URL) http://purl.flvc.org/fau/fd/FA00004965

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Manju, C. Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves.

Degree: 2010, Cochin University of Science and Technology

Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a… (more)

Subjects/Keywords: Algebraic Geometric Codes; Public Key cryptography; Secret sharing,; Cryptographic algorithm,; Implementation.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Manju, C. (2010). Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves. (Thesis). Cochin University of Science and Technology. Retrieved from http://dyuthi.cusat.ac.in/purl/3702

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Manju, C. “Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves.” 2010. Thesis, Cochin University of Science and Technology. Accessed December 06, 2019. http://dyuthi.cusat.ac.in/purl/3702.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Manju, C. “Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves.” 2010. Web. 06 Dec 2019.

Vancouver:

Manju C. Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves. [Internet] [Thesis]. Cochin University of Science and Technology; 2010. [cited 2019 Dec 06]. Available from: http://dyuthi.cusat.ac.in/purl/3702.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Manju C. Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves. [Thesis]. Cochin University of Science and Technology; 2010. Available from: http://dyuthi.cusat.ac.in/purl/3702

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hyderabad

24. Padmavathy, S. Computational studies on discrete logarithm problem; -.

Degree: Computer and Information Sciences, 2009, University of Hyderabad

The broad objective of the present work is computational analysis on the mathematically hard Discrete Logarithm Problem(DLP). The DLP forms the basis for several popular… (more)

Subjects/Keywords: Index Calculus Method; Public key cryptography; Linear sieve method

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Padmavathy, S. (2009). Computational studies on discrete logarithm problem; -. (Thesis). University of Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/4252

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Padmavathy, S. “Computational studies on discrete logarithm problem; -.” 2009. Thesis, University of Hyderabad. Accessed December 06, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/4252.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Padmavathy, S. “Computational studies on discrete logarithm problem; -.” 2009. Web. 06 Dec 2019.

Vancouver:

Padmavathy S. Computational studies on discrete logarithm problem; -. [Internet] [Thesis]. University of Hyderabad; 2009. [cited 2019 Dec 06]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/4252.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Padmavathy S. Computational studies on discrete logarithm problem; -. [Thesis]. University of Hyderabad; 2009. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/4252

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Royal Holloway, University of London

25. Quaglia, Elizabeth. Anonymity and time in public-key encryption.

Degree: 2012, Royal Holloway, University of London

 In a world that is increasingly relying on digital technologies, the ability to securely communicate and distribute information is of crucial importance. Cryptography plays a… (more)

Subjects/Keywords: 652.8; Cryptography : Public-key encryption : Anonymity : Robustness : Broadcast encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Quaglia, E. (2012). Anonymity and time in public-key encryption. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580630

Chicago Manual of Style (16th Edition):

Quaglia, Elizabeth. “Anonymity and time in public-key encryption.” 2012. Doctoral Dissertation, Royal Holloway, University of London. Accessed December 06, 2019. http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580630.

MLA Handbook (7th Edition):

Quaglia, Elizabeth. “Anonymity and time in public-key encryption.” 2012. Web. 06 Dec 2019.

Vancouver:

Quaglia E. Anonymity and time in public-key encryption. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2012. [cited 2019 Dec 06]. Available from: http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580630.

Council of Science Editors:

Quaglia E. Anonymity and time in public-key encryption. [Doctoral Dissertation]. Royal Holloway, University of London; 2012. Available from: http://repository.royalholloway.ac.uk/items/5d2c96e9-a243-71ea-acd5-1dc78c707035/7/ ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.580630


Addis Ababa University

26. FETENE NEGA. CAUSES AND EFFECTS OF COST OVERRUN ON PUBLIC BUILDING CONSTRUCTION PROJECTS IN ETHIOPIA .

Degree: 2008, Addis Ababa University

 Many projects experience cost overrun and thereby exceed initial contract amount. In Ethiopia, the number of public building construction projects is increasing from time to… (more)

Subjects/Keywords: Key words: cost overrun; cause; effect; rate; public buildings.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

NEGA, F. (2008). CAUSES AND EFFECTS OF COST OVERRUN ON PUBLIC BUILDING CONSTRUCTION PROJECTS IN ETHIOPIA . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/4215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

NEGA, FETENE. “CAUSES AND EFFECTS OF COST OVERRUN ON PUBLIC BUILDING CONSTRUCTION PROJECTS IN ETHIOPIA .” 2008. Thesis, Addis Ababa University. Accessed December 06, 2019. http://etd.aau.edu.et/dspace/handle/123456789/4215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

NEGA, FETENE. “CAUSES AND EFFECTS OF COST OVERRUN ON PUBLIC BUILDING CONSTRUCTION PROJECTS IN ETHIOPIA .” 2008. Web. 06 Dec 2019.

Vancouver:

NEGA F. CAUSES AND EFFECTS OF COST OVERRUN ON PUBLIC BUILDING CONSTRUCTION PROJECTS IN ETHIOPIA . [Internet] [Thesis]. Addis Ababa University; 2008. [cited 2019 Dec 06]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/4215.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

NEGA F. CAUSES AND EFFECTS OF COST OVERRUN ON PUBLIC BUILDING CONSTRUCTION PROJECTS IN ETHIOPIA . [Thesis]. Addis Ababa University; 2008. Available from: http://etd.aau.edu.et/dspace/handle/123456789/4215

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Melin, Tomas. Namecoin as authentication for public-key cryptography.

Degree: The Institute of Technology, 2014, Linköping UniversityLinköping University

Public-key cryptography is a subject that is very important to everyone who wants confidentiality and privacy in networks. It is important to understand how… (more)

Subjects/Keywords: Namecoin; block chain; public-key chryptography; Computer Engineering; Datorteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Melin, T. (2014). Namecoin as authentication for public-key cryptography. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108413

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Melin, Tomas. “Namecoin as authentication for public-key cryptography.” 2014. Thesis, Linköping UniversityLinköping University. Accessed December 06, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108413.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Melin, Tomas. “Namecoin as authentication for public-key cryptography.” 2014. Web. 06 Dec 2019.

Vancouver:

Melin T. Namecoin as authentication for public-key cryptography. [Internet] [Thesis]. Linköping UniversityLinköping University; 2014. [cited 2019 Dec 06]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108413.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Melin T. Namecoin as authentication for public-key cryptography. [Thesis]. Linköping UniversityLinköping University; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108413

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

28. Clough, Crystal L. Square: A New Family of Multivariate Encryption Schemes.

Degree: PhD, Arts and Sciences : Mathematical Sciences, 2009, University of Cincinnati

 We describe and analyze a new family of multivariate encryption schemes, characterized by large characteristic and low-degree core maps. The patriarch system Square is broken,… (more)

Subjects/Keywords: Mathematics; Multivariate Cryptography; Public Key Encryption Scheme; Odd Characteristic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Clough, C. L. (2009). Square: A New Family of Multivariate Encryption Schemes. (Doctoral Dissertation). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1243351066

Chicago Manual of Style (16th Edition):

Clough, Crystal L. “Square: A New Family of Multivariate Encryption Schemes.” 2009. Doctoral Dissertation, University of Cincinnati. Accessed December 06, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1243351066.

MLA Handbook (7th Edition):

Clough, Crystal L. “Square: A New Family of Multivariate Encryption Schemes.” 2009. Web. 06 Dec 2019.

Vancouver:

Clough CL. Square: A New Family of Multivariate Encryption Schemes. [Internet] [Doctoral dissertation]. University of Cincinnati; 2009. [cited 2019 Dec 06]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1243351066.

Council of Science Editors:

Clough CL. Square: A New Family of Multivariate Encryption Schemes. [Doctoral Dissertation]. University of Cincinnati; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1243351066


Ruhr Universität Bochum

29. Herold, Gottfried. Applications of classical algebraic geometry to cryptography.

Degree: 2014, Ruhr Universität Bochum

 Diese Arbeit behandelt Anwendungen klassischer algebraischer Geometrie auf Fragestellungen der Kryptographie. Der erste Teil der Arbeit behandelt dabei das Polly Cracker with Noise Verschlüsselungsverfahren (Albrecht… (more)

Subjects/Keywords: Algebraische Geometrie; Algebraische Methode; Kryptologie; Ideal (Mathematik); Public-Key-Kryptosystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Herold, G. (2014). Applications of classical algebraic geometry to cryptography. (Thesis). Ruhr Universität Bochum. Retrieved from http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43359

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Herold, Gottfried. “Applications of classical algebraic geometry to cryptography.” 2014. Thesis, Ruhr Universität Bochum. Accessed December 06, 2019. http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43359.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Herold, Gottfried. “Applications of classical algebraic geometry to cryptography.” 2014. Web. 06 Dec 2019.

Vancouver:

Herold G. Applications of classical algebraic geometry to cryptography. [Internet] [Thesis]. Ruhr Universität Bochum; 2014. [cited 2019 Dec 06]. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43359.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Herold G. Applications of classical algebraic geometry to cryptography. [Thesis]. Ruhr Universität Bochum; 2014. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43359

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ruhr Universität Bochum

30. Frosch, Tilman. On mitigation of client-side attacks and protection of private data.

Degree: 2015, Ruhr Universität Bochum

 Die vorliegende Dissertation befasst sich mit der Frage wie und unter welchen Bedingungen die Kontrolle über private Daten auf existierenden Computersystemen verbessert werden kann. Die… (more)

Subjects/Keywords: Public-Key-Kryptosystem; Computersicherheit; Browser / Sicherheit; Datenschutz; Internet / Sicherheit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frosch, T. (2015). On mitigation of client-side attacks and protection of private data. (Thesis). Ruhr Universität Bochum. Retrieved from http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43776

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frosch, Tilman. “On mitigation of client-side attacks and protection of private data.” 2015. Thesis, Ruhr Universität Bochum. Accessed December 06, 2019. http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43776.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frosch, Tilman. “On mitigation of client-side attacks and protection of private data.” 2015. Web. 06 Dec 2019.

Vancouver:

Frosch T. On mitigation of client-side attacks and protection of private data. [Internet] [Thesis]. Ruhr Universität Bochum; 2015. [cited 2019 Dec 06]. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43776.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frosch T. On mitigation of client-side attacks and protection of private data. [Thesis]. Ruhr Universität Bochum; 2015. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43776

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

.