Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Authentication). Showing records 1 – 30 of 940 total matches.

[1] [2] [3] [4] [5] … [32]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters

1. Baldimtsi, Foteini. Efficient Cryptography for Information Privacy.

Degree: PhD, Computer Science, 2014, Brown University

 In the modern digital society, individuals, businesses and governments perform numerous everyday tasks such as shopping, banking and commuting using electronic media. Although these electronic… (more)

Subjects/Keywords: private authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Baldimtsi, F. (2014). Efficient Cryptography for Information Privacy. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:386305/

Chicago Manual of Style (16th Edition):

Baldimtsi, Foteini. “Efficient Cryptography for Information Privacy.” 2014. Doctoral Dissertation, Brown University. Accessed October 01, 2020. https://repository.library.brown.edu/studio/item/bdr:386305/.

MLA Handbook (7th Edition):

Baldimtsi, Foteini. “Efficient Cryptography for Information Privacy.” 2014. Web. 01 Oct 2020.

Vancouver:

Baldimtsi F. Efficient Cryptography for Information Privacy. [Internet] [Doctoral dissertation]. Brown University; 2014. [cited 2020 Oct 01]. Available from: https://repository.library.brown.edu/studio/item/bdr:386305/.

Council of Science Editors:

Baldimtsi F. Efficient Cryptography for Information Privacy. [Doctoral Dissertation]. Brown University; 2014. Available from: https://repository.library.brown.edu/studio/item/bdr:386305/


University of Otago

2. McComb, Kiri Alan. Geochemical Authentication of New Zealand Honey .

Degree: 2012, University of Otago

 Fraudulent practices in relation to production and distribution of foodstuffs have been prevalent throughout history. The intentional or accidental tampering of a food supply for… (more)

Subjects/Keywords: Authentication; Honey

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McComb, K. A. (2012). Geochemical Authentication of New Zealand Honey . (Doctoral Dissertation). University of Otago. Retrieved from http://hdl.handle.net/10523/2351

Chicago Manual of Style (16th Edition):

McComb, Kiri Alan. “Geochemical Authentication of New Zealand Honey .” 2012. Doctoral Dissertation, University of Otago. Accessed October 01, 2020. http://hdl.handle.net/10523/2351.

MLA Handbook (7th Edition):

McComb, Kiri Alan. “Geochemical Authentication of New Zealand Honey .” 2012. Web. 01 Oct 2020.

Vancouver:

McComb KA. Geochemical Authentication of New Zealand Honey . [Internet] [Doctoral dissertation]. University of Otago; 2012. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10523/2351.

Council of Science Editors:

McComb KA. Geochemical Authentication of New Zealand Honey . [Doctoral Dissertation]. University of Otago; 2012. Available from: http://hdl.handle.net/10523/2351

3. Bonneau, Joseph. Guessing human-chosen secrets.

Degree: PhD, 2012, University of Cambridge

 Authenticating humans to computers remains a notable weak point in computer security despite decades of effort. Although the security research community has explored dozens of… (more)

Subjects/Keywords: Passwords; Authentication

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bonneau, J. (2012). Guessing human-chosen secrets. (Doctoral Dissertation). University of Cambridge. Retrieved from http://www.dspace.cam.ac.uk/handle/1810/243444https://www.repository.cam.ac.uk/bitstream/1810/243444/2/license.txt ; https://www.repository.cam.ac.uk/bitstream/1810/243444/5/2012-jbonneau-phd_thesis.pdf.txt ; https://www.repository.cam.ac.uk/bitstream/1810/243444/6/2012-jbonneau-phd_thesis.pdf.jpg

Chicago Manual of Style (16th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets.” 2012. Doctoral Dissertation, University of Cambridge. Accessed October 01, 2020. http://www.dspace.cam.ac.uk/handle/1810/243444https://www.repository.cam.ac.uk/bitstream/1810/243444/2/license.txt ; https://www.repository.cam.ac.uk/bitstream/1810/243444/5/2012-jbonneau-phd_thesis.pdf.txt ; https://www.repository.cam.ac.uk/bitstream/1810/243444/6/2012-jbonneau-phd_thesis.pdf.jpg.

MLA Handbook (7th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets.” 2012. Web. 01 Oct 2020.

Vancouver:

Bonneau J. Guessing human-chosen secrets. [Internet] [Doctoral dissertation]. University of Cambridge; 2012. [cited 2020 Oct 01]. Available from: http://www.dspace.cam.ac.uk/handle/1810/243444https://www.repository.cam.ac.uk/bitstream/1810/243444/2/license.txt ; https://www.repository.cam.ac.uk/bitstream/1810/243444/5/2012-jbonneau-phd_thesis.pdf.txt ; https://www.repository.cam.ac.uk/bitstream/1810/243444/6/2012-jbonneau-phd_thesis.pdf.jpg.

Council of Science Editors:

Bonneau J. Guessing human-chosen secrets. [Doctoral Dissertation]. University of Cambridge; 2012. Available from: http://www.dspace.cam.ac.uk/handle/1810/243444https://www.repository.cam.ac.uk/bitstream/1810/243444/2/license.txt ; https://www.repository.cam.ac.uk/bitstream/1810/243444/5/2012-jbonneau-phd_thesis.pdf.txt ; https://www.repository.cam.ac.uk/bitstream/1810/243444/6/2012-jbonneau-phd_thesis.pdf.jpg


California State Polytechnic University – Pomona

4. Chidri, Laxmi. Design and Implementation of Authentication Scheme by Encrypted Negative Password.

Degree: MS, Department of Computer Science, 2020, California State Polytechnic University – Pomona

 Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite its some… (more)

Subjects/Keywords: password authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chidri, L. (2020). Design and Implementation of Authentication Scheme by Encrypted Negative Password. (Masters Thesis). California State Polytechnic University – Pomona. Retrieved from http://hdl.handle.net/10211.3/215291

Chicago Manual of Style (16th Edition):

Chidri, Laxmi. “Design and Implementation of Authentication Scheme by Encrypted Negative Password.” 2020. Masters Thesis, California State Polytechnic University – Pomona. Accessed October 01, 2020. http://hdl.handle.net/10211.3/215291.

MLA Handbook (7th Edition):

Chidri, Laxmi. “Design and Implementation of Authentication Scheme by Encrypted Negative Password.” 2020. Web. 01 Oct 2020.

Vancouver:

Chidri L. Design and Implementation of Authentication Scheme by Encrypted Negative Password. [Internet] [Masters thesis]. California State Polytechnic University – Pomona; 2020. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10211.3/215291.

Council of Science Editors:

Chidri L. Design and Implementation of Authentication Scheme by Encrypted Negative Password. [Masters Thesis]. California State Polytechnic University – Pomona; 2020. Available from: http://hdl.handle.net/10211.3/215291


University of Waterloo

5. Khan, Hassan. Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios.

Degree: 2016, University of Waterloo

 Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication(more)

Subjects/Keywords: Security; Authentication; Implicit authentication; Usable security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khan, H. (2016). Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10621

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khan, Hassan. “Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios.” 2016. Thesis, University of Waterloo. Accessed October 01, 2020. http://hdl.handle.net/10012/10621.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khan, Hassan. “Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios.” 2016. Web. 01 Oct 2020.

Vancouver:

Khan H. Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios. [Internet] [Thesis]. University of Waterloo; 2016. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10012/10621.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khan H. Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios. [Thesis]. University of Waterloo; 2016. Available from: http://hdl.handle.net/10012/10621

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

6. Kancharlapalli, Sunil. Smartpass: a New Authentication Scheme Using Geolocation.

Degree: Computer Science, 2014, Oklahoma State University

Authentication is critical in today's digital world. Everything from e-mail access to e-commerce to online banking requires users to authenticate themselves. The most common form… (more)

Subjects/Keywords: authentication; passwords; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kancharlapalli, S. (2014). Smartpass: a New Authentication Scheme Using Geolocation. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/14926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kancharlapalli, Sunil. “Smartpass: a New Authentication Scheme Using Geolocation.” 2014. Thesis, Oklahoma State University. Accessed October 01, 2020. http://hdl.handle.net/11244/14926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kancharlapalli, Sunil. “Smartpass: a New Authentication Scheme Using Geolocation.” 2014. Web. 01 Oct 2020.

Vancouver:

Kancharlapalli S. Smartpass: a New Authentication Scheme Using Geolocation. [Internet] [Thesis]. Oklahoma State University; 2014. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/11244/14926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kancharlapalli S. Smartpass: a New Authentication Scheme Using Geolocation. [Thesis]. Oklahoma State University; 2014. Available from: http://hdl.handle.net/11244/14926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

7. Yang, Shukun. A diversity-based framework for dynamic password policy generation.

Degree: MS, Electrical and Computer Engineering, 2016, Georgia Tech

 To keep password users from creating simple and common passwords, major websites and applications provide a password-strength measure, namely a password checker that displays instant… (more)

Subjects/Keywords: Password; Authentication; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, S. (2016). A diversity-based framework for dynamic password policy generation. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58192

Chicago Manual of Style (16th Edition):

Yang, Shukun. “A diversity-based framework for dynamic password policy generation.” 2016. Masters Thesis, Georgia Tech. Accessed October 01, 2020. http://hdl.handle.net/1853/58192.

MLA Handbook (7th Edition):

Yang, Shukun. “A diversity-based framework for dynamic password policy generation.” 2016. Web. 01 Oct 2020.

Vancouver:

Yang S. A diversity-based framework for dynamic password policy generation. [Internet] [Masters thesis]. Georgia Tech; 2016. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/1853/58192.

Council of Science Editors:

Yang S. A diversity-based framework for dynamic password policy generation. [Masters Thesis]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/58192


University of Cambridge

8. Bonneau, Joseph. Guessing human-chosen secrets.

Degree: PhD, 2012, University of Cambridge

 Authenticating humans to computers remains a notable weak point in computer security despite decades of effort. Although the security research community has explored dozens of… (more)

Subjects/Keywords: 005.8; Passwords; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bonneau, J. (2012). Guessing human-chosen secrets. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189

Chicago Manual of Style (16th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets.” 2012. Doctoral Dissertation, University of Cambridge. Accessed October 01, 2020. https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189.

MLA Handbook (7th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets.” 2012. Web. 01 Oct 2020.

Vancouver:

Bonneau J. Guessing human-chosen secrets. [Internet] [Doctoral dissertation]. University of Cambridge; 2012. [cited 2020 Oct 01]. Available from: https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189.

Council of Science Editors:

Bonneau J. Guessing human-chosen secrets. [Doctoral Dissertation]. University of Cambridge; 2012. Available from: https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189


University of Ontario Institute of Technology

9. Addas, Alaadin. Systems and models for secure fallback authentication.

Degree: 2018, University of Ontario Institute of Technology

 Fallback authentication (FA) techniques such as security questions, Email resets, and SMS resets have significant security flaws that easily undermine the primary method of authentication.… (more)

Subjects/Keywords: Geographic authentication; Fallback authentication; Autobiographical authentication; Known adversary

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Addas, A. (2018). Systems and models for secure fallback authentication. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/1004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Addas, Alaadin. “Systems and models for secure fallback authentication.” 2018. Thesis, University of Ontario Institute of Technology. Accessed October 01, 2020. http://hdl.handle.net/10155/1004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Addas, Alaadin. “Systems and models for secure fallback authentication.” 2018. Web. 01 Oct 2020.

Vancouver:

Addas A. Systems and models for secure fallback authentication. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10155/1004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Addas A. Systems and models for secure fallback authentication. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/1004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

10. Senathipathi K. Behavioural biometric authentication with reference to keystroke dynamics;.

Degree: Behavioural biometric authentication with reference to keystroke dynamics, 2015, Anna University

Computer security has become an indispensable and critical aspect in the motif evolution and application of computer Since cyber crime and security remain the dominant… (more)

Subjects/Keywords: Biometric authentication; Genetic algorithm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

K, S. (2015). Behavioural biometric authentication with reference to keystroke dynamics;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/41935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

K, Senathipathi. “Behavioural biometric authentication with reference to keystroke dynamics;.” 2015. Thesis, Anna University. Accessed October 01, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/41935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

K, Senathipathi. “Behavioural biometric authentication with reference to keystroke dynamics;.” 2015. Web. 01 Oct 2020.

Vancouver:

K S. Behavioural biometric authentication with reference to keystroke dynamics;. [Internet] [Thesis]. Anna University; 2015. [cited 2020 Oct 01]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/41935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

K S. Behavioural biometric authentication with reference to keystroke dynamics;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/41935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

11. Wilson, Paul Lawrence. ModSec: A secure Modbus protocol.

Degree: MS, Electrical and Computer Engineering, 2018, Georgia Tech

 Many of todays most critical infrastructures rely on the successful operation of Supervisory Control and Data Acquisition (SCADA) systems distributed all around the world. Infrastructures… (more)

Subjects/Keywords: Modbus; Authentication; Security; ICS; SCADA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wilson, P. L. (2018). ModSec: A secure Modbus protocol. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62615

Chicago Manual of Style (16th Edition):

Wilson, Paul Lawrence. “ModSec: A secure Modbus protocol.” 2018. Masters Thesis, Georgia Tech. Accessed October 01, 2020. http://hdl.handle.net/1853/62615.

MLA Handbook (7th Edition):

Wilson, Paul Lawrence. “ModSec: A secure Modbus protocol.” 2018. Web. 01 Oct 2020.

Vancouver:

Wilson PL. ModSec: A secure Modbus protocol. [Internet] [Masters thesis]. Georgia Tech; 2018. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/1853/62615.

Council of Science Editors:

Wilson PL. ModSec: A secure Modbus protocol. [Masters Thesis]. Georgia Tech; 2018. Available from: http://hdl.handle.net/1853/62615


Vanderbilt University

12. Teng, Zhongwei. Implementation of Self-report mHealth Application and Data Analysis.

Degree: MS, Electrical Engineering, 2017, Vanderbilt University

 As a growing industry, mHealth has been adopted in many fields of healthcare, such as diabetes, hypertension, asthma, eating disorders and data collection. To improve… (more)

Subjects/Keywords: Data Analysis; Authentication; mHealth

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Teng, Z. (2017). Implementation of Self-report mHealth Application and Data Analysis. (Thesis). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/15163

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Teng, Zhongwei. “Implementation of Self-report mHealth Application and Data Analysis.” 2017. Thesis, Vanderbilt University. Accessed October 01, 2020. http://hdl.handle.net/1803/15163.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Teng, Zhongwei. “Implementation of Self-report mHealth Application and Data Analysis.” 2017. Web. 01 Oct 2020.

Vancouver:

Teng Z. Implementation of Self-report mHealth Application and Data Analysis. [Internet] [Thesis]. Vanderbilt University; 2017. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/1803/15163.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Teng Z. Implementation of Self-report mHealth Application and Data Analysis. [Thesis]. Vanderbilt University; 2017. Available from: http://hdl.handle.net/1803/15163

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

13. Sankara, Subramanian R S. A study on cryptography for Intrinsic authentication applications; -.

Degree: Science and Humanities, 2014, Anna University

Cryptography is the practice and study of hiding information In newlinemodern times cryptography is considered as a branch of both mathematics newlineand computer science and… (more)

Subjects/Keywords: Cryptography; Intrinsic authentication applications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sankara, S. R. S. (2014). A study on cryptography for Intrinsic authentication applications; -. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/26983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sankara, Subramanian R S. “A study on cryptography for Intrinsic authentication applications; -.” 2014. Thesis, Anna University. Accessed October 01, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/26983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sankara, Subramanian R S. “A study on cryptography for Intrinsic authentication applications; -.” 2014. Web. 01 Oct 2020.

Vancouver:

Sankara SRS. A study on cryptography for Intrinsic authentication applications; -. [Internet] [Thesis]. Anna University; 2014. [cited 2020 Oct 01]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/26983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sankara SRS. A study on cryptography for Intrinsic authentication applications; -. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/26983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

14. Velumani R. Robust zero watermarking for Medical image authentication;.

Degree: Robust zero watermarking for Medical image authentication, 2015, Anna University

Advancements in information and communication technology have newlinerevolutionized healthcare with dayhawk and nighthawk teleradiology newlinesolutions These services require clinical reports medical history etc to newlinesupplement… (more)

Subjects/Keywords: Medical image authentication; Teleradiology practices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

R, V. (2015). Robust zero watermarking for Medical image authentication;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/34258

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

R, Velumani. “Robust zero watermarking for Medical image authentication;.” 2015. Thesis, Anna University. Accessed October 01, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/34258.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

R, Velumani. “Robust zero watermarking for Medical image authentication;.” 2015. Web. 01 Oct 2020.

Vancouver:

R V. Robust zero watermarking for Medical image authentication;. [Internet] [Thesis]. Anna University; 2015. [cited 2020 Oct 01]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34258.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

R V. Robust zero watermarking for Medical image authentication;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34258

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Stewart, Alexander. Analysis Of Possible Authentication Strategies For The Automated Identification System.

Degree: Information Assurance: M.S., Information Assurance and Information Systems, 2018, St. Cloud State University

  Automatic Identification System, commonly known as AIS, is a maritime communication system that is used to keep track of positions and activities of ships.… (more)

Subjects/Keywords: AIS; authentication; maritime; digital signature

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stewart, A. (2018). Analysis Of Possible Authentication Strategies For The Automated Identification System. (Masters Thesis). St. Cloud State University. Retrieved from https://repository.stcloudstate.edu/msia_etds/51

Chicago Manual of Style (16th Edition):

Stewart, Alexander. “Analysis Of Possible Authentication Strategies For The Automated Identification System.” 2018. Masters Thesis, St. Cloud State University. Accessed October 01, 2020. https://repository.stcloudstate.edu/msia_etds/51.

MLA Handbook (7th Edition):

Stewart, Alexander. “Analysis Of Possible Authentication Strategies For The Automated Identification System.” 2018. Web. 01 Oct 2020.

Vancouver:

Stewart A. Analysis Of Possible Authentication Strategies For The Automated Identification System. [Internet] [Masters thesis]. St. Cloud State University; 2018. [cited 2020 Oct 01]. Available from: https://repository.stcloudstate.edu/msia_etds/51.

Council of Science Editors:

Stewart A. Analysis Of Possible Authentication Strategies For The Automated Identification System. [Masters Thesis]. St. Cloud State University; 2018. Available from: https://repository.stcloudstate.edu/msia_etds/51


University of New South Wales

16. Liu, Tao. On Design of Memory Data Authentication For Embedded Processor Systems.

Degree: Computer Science & Engineering, 2015, University of New South Wales

 The boom of embedded systems and their wide applications, especially in thearea of e-business and -service, have raised increasing concerns about their security. One of… (more)

Subjects/Keywords: Memory protection; Message authentication; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, T. (2015). On Design of Memory Data Authentication For Embedded Processor Systems. (Masters Thesis). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Liu, Tao. “On Design of Memory Data Authentication For Embedded Processor Systems.” 2015. Masters Thesis, University of New South Wales. Accessed October 01, 2020. http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true.

MLA Handbook (7th Edition):

Liu, Tao. “On Design of Memory Data Authentication For Embedded Processor Systems.” 2015. Web. 01 Oct 2020.

Vancouver:

Liu T. On Design of Memory Data Authentication For Embedded Processor Systems. [Internet] [Masters thesis]. University of New South Wales; 2015. [cited 2020 Oct 01]. Available from: http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true.

Council of Science Editors:

Liu T. On Design of Memory Data Authentication For Embedded Processor Systems. [Masters Thesis]. University of New South Wales; 2015. Available from: http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true


Tampere University

17. Sadeghian Boroujeni, Bahareh. Development of a shared authentication system – a microservice approach .

Degree: 2019, Tampere University

Subjects/Keywords: authentication; microservice

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sadeghian Boroujeni, B. (2019). Development of a shared authentication system – a microservice approach . (Masters Thesis). Tampere University. Retrieved from https://trepo.tuni.fi/handle/10024/118040

Chicago Manual of Style (16th Edition):

Sadeghian Boroujeni, Bahareh. “Development of a shared authentication system – a microservice approach .” 2019. Masters Thesis, Tampere University. Accessed October 01, 2020. https://trepo.tuni.fi/handle/10024/118040.

MLA Handbook (7th Edition):

Sadeghian Boroujeni, Bahareh. “Development of a shared authentication system – a microservice approach .” 2019. Web. 01 Oct 2020.

Vancouver:

Sadeghian Boroujeni B. Development of a shared authentication system – a microservice approach . [Internet] [Masters thesis]. Tampere University; 2019. [cited 2020 Oct 01]. Available from: https://trepo.tuni.fi/handle/10024/118040.

Council of Science Editors:

Sadeghian Boroujeni B. Development of a shared authentication system – a microservice approach . [Masters Thesis]. Tampere University; 2019. Available from: https://trepo.tuni.fi/handle/10024/118040


Universidade do Minho

18. Carvalho, Nuno Tiago Ferreira de. A practical validation of Homomorphic Message Authentication schemes .

Degree: 2014, Universidade do Minho

 Currently, cloud computing is very appealing because it allows the user to outsource his data so it can later be accessed from multiple devices. The… (more)

Subjects/Keywords: Homomorphic mac; Authentication; Cloud computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carvalho, N. T. F. d. (2014). A practical validation of Homomorphic Message Authentication schemes . (Masters Thesis). Universidade do Minho. Retrieved from http://hdl.handle.net/1822/37266

Chicago Manual of Style (16th Edition):

Carvalho, Nuno Tiago Ferreira de. “A practical validation of Homomorphic Message Authentication schemes .” 2014. Masters Thesis, Universidade do Minho. Accessed October 01, 2020. http://hdl.handle.net/1822/37266.

MLA Handbook (7th Edition):

Carvalho, Nuno Tiago Ferreira de. “A practical validation of Homomorphic Message Authentication schemes .” 2014. Web. 01 Oct 2020.

Vancouver:

Carvalho NTFd. A practical validation of Homomorphic Message Authentication schemes . [Internet] [Masters thesis]. Universidade do Minho; 2014. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/1822/37266.

Council of Science Editors:

Carvalho NTFd. A practical validation of Homomorphic Message Authentication schemes . [Masters Thesis]. Universidade do Minho; 2014. Available from: http://hdl.handle.net/1822/37266

19. Amo, Keiji. A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: user authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amo, K. (n.d.). A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/2073

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Amo, Keiji. “A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed October 01, 2020. http://hdl.handle.net/10061/2073.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Amo, Keiji. “A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ.” Web. 01 Oct 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Amo K. A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10061/2073.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Amo K. A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/2073

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Ontario Institute of Technology

20. Veras Guimaraes, Rafael. An investigation of semantic patterns in passwords.

Degree: 2013, University of Ontario Institute of Technology

 The advent of large password leaks in recent years has exposed the security problems of passwords and enabled deeper empirical investigation of password patterns. Researchers… (more)

Subjects/Keywords: Security; Passwords; Authentication; Semantics; Guessing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Veras Guimaraes, R. (2013). An investigation of semantic patterns in passwords. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Veras Guimaraes, Rafael. “An investigation of semantic patterns in passwords.” 2013. Thesis, University of Ontario Institute of Technology. Accessed October 01, 2020. http://hdl.handle.net/10155/331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Veras Guimaraes, Rafael. “An investigation of semantic patterns in passwords.” 2013. Web. 01 Oct 2020.

Vancouver:

Veras Guimaraes R. An investigation of semantic patterns in passwords. [Internet] [Thesis]. University of Ontario Institute of Technology; 2013. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10155/331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Veras Guimaraes R. An investigation of semantic patterns in passwords. [Thesis]. University of Ontario Institute of Technology; 2013. Available from: http://hdl.handle.net/10155/331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

21. MacRae, Brent Alexander. Strategies and applications for creating more memorable passwords.

Degree: 2016, University of Ontario Institute of Technology

 As we continue to learn and grow in an ever evolving technological age, we deepen our understanding of the importance of authentication. There are many… (more)

Subjects/Keywords: Passwords; Authentication; Memorability; Security; Usability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MacRae, B. A. (2016). Strategies and applications for creating more memorable passwords. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/876

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

MacRae, Brent Alexander. “Strategies and applications for creating more memorable passwords.” 2016. Thesis, University of Ontario Institute of Technology. Accessed October 01, 2020. http://hdl.handle.net/10155/876.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

MacRae, Brent Alexander. “Strategies and applications for creating more memorable passwords.” 2016. Web. 01 Oct 2020.

Vancouver:

MacRae BA. Strategies and applications for creating more memorable passwords. [Internet] [Thesis]. University of Ontario Institute of Technology; 2016. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10155/876.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

MacRae BA. Strategies and applications for creating more memorable passwords. [Thesis]. University of Ontario Institute of Technology; 2016. Available from: http://hdl.handle.net/10155/876

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université Catholique de Louvain

22. Carpent, Xavier. RFID authentication and time-memory trade-offs.

Degree: 2015, Université Catholique de Louvain

RFID is a technology that allows identification and authentication of objects or persons through the use of wireless communication between tags and readers. RFID Tags… (more)

Subjects/Keywords: Security; Privacy; Cryptography; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carpent, X. (2015). RFID authentication and time-memory trade-offs. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/157885

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Carpent, Xavier. “RFID authentication and time-memory trade-offs.” 2015. Thesis, Université Catholique de Louvain. Accessed October 01, 2020. http://hdl.handle.net/2078.1/157885.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Carpent, Xavier. “RFID authentication and time-memory trade-offs.” 2015. Web. 01 Oct 2020.

Vancouver:

Carpent X. RFID authentication and time-memory trade-offs. [Internet] [Thesis]. Université Catholique de Louvain; 2015. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/2078.1/157885.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Carpent X. RFID authentication and time-memory trade-offs. [Thesis]. Université Catholique de Louvain; 2015. Available from: http://hdl.handle.net/2078.1/157885

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Plymouth

23. Saevanee, Hataichanok. Continuous user authentication using multi-modal biometrics.

Degree: PhD, 2014, University of Plymouth

 It is commonly acknowledged that mobile devices now form an integral part of an individual’s everyday life. The modern mobile handheld devices are capable to… (more)

Subjects/Keywords: 005.8; Biometrics; Authentication; Mobile Devices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saevanee, H. (2014). Continuous user authentication using multi-modal biometrics. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3033

Chicago Manual of Style (16th Edition):

Saevanee, Hataichanok. “Continuous user authentication using multi-modal biometrics.” 2014. Doctoral Dissertation, University of Plymouth. Accessed October 01, 2020. http://hdl.handle.net/10026.1/3033.

MLA Handbook (7th Edition):

Saevanee, Hataichanok. “Continuous user authentication using multi-modal biometrics.” 2014. Web. 01 Oct 2020.

Vancouver:

Saevanee H. Continuous user authentication using multi-modal biometrics. [Internet] [Doctoral dissertation]. University of Plymouth; 2014. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10026.1/3033.

Council of Science Editors:

Saevanee H. Continuous user authentication using multi-modal biometrics. [Doctoral Dissertation]. University of Plymouth; 2014. Available from: http://hdl.handle.net/10026.1/3033

24. Ojaide, Christopher Lucky. INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution.

Degree: 2010, , School of Computing

  ABSTRACT An effective national identification system is a necessity in any national government for the proper implementation and execution of its governmental policies and… (more)

Subjects/Keywords: Identification; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ojaide, C. L. (2010). INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution. (Thesis). , School of Computing. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3836

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ojaide, Christopher Lucky. “INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution.” 2010. Thesis, , School of Computing. Accessed October 01, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3836.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ojaide, Christopher Lucky. “INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution.” 2010. Web. 01 Oct 2020.

Vancouver:

Ojaide CL. INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution. [Internet] [Thesis]. , School of Computing; 2010. [cited 2020 Oct 01]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3836.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ojaide CL. INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution. [Thesis]. , School of Computing; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3836

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

25. Shah, Syed Wajid Ali. Exploring pervasive signals and devices for user authentication.

Degree: Computer Science & Engineering, 2019, University of New South Wales

 User authentication is critical to numerous operations in the digital world. Current approaches to authentication (e.g., passwords, biometrics) are repeatedly shown to be vulnerable to… (more)

Subjects/Keywords: User authentication; Pervasive signals; Devices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shah, S. W. A. (2019). Exploring pervasive signals and devices for user authentication. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/64930 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:63032/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Shah, Syed Wajid Ali. “Exploring pervasive signals and devices for user authentication.” 2019. Doctoral Dissertation, University of New South Wales. Accessed October 01, 2020. http://handle.unsw.edu.au/1959.4/64930 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:63032/SOURCE02?view=true.

MLA Handbook (7th Edition):

Shah, Syed Wajid Ali. “Exploring pervasive signals and devices for user authentication.” 2019. Web. 01 Oct 2020.

Vancouver:

Shah SWA. Exploring pervasive signals and devices for user authentication. [Internet] [Doctoral dissertation]. University of New South Wales; 2019. [cited 2020 Oct 01]. Available from: http://handle.unsw.edu.au/1959.4/64930 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:63032/SOURCE02?view=true.

Council of Science Editors:

Shah SWA. Exploring pervasive signals and devices for user authentication. [Doctoral Dissertation]. University of New South Wales; 2019. Available from: http://handle.unsw.edu.au/1959.4/64930 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:63032/SOURCE02?view=true


University of Illinois – Urbana-Champaign

26. Li, Hongyang. Privacy-preserving authentication and billing for dynamic charging of electric vehicles.

Degree: PhD, Computer Science, 2016, University of Illinois – Urbana-Champaign

 Dynamic charging of electric vehicles (EVs) is a promising technology for future electrified transportation. By installing wireless charging pads under the roadbed, dynamic charging allows… (more)

Subjects/Keywords: electric vehicle; privacy; authentication; billing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, H. (2016). Privacy-preserving authentication and billing for dynamic charging of electric vehicles. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/92707

Chicago Manual of Style (16th Edition):

Li, Hongyang. “Privacy-preserving authentication and billing for dynamic charging of electric vehicles.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 01, 2020. http://hdl.handle.net/2142/92707.

MLA Handbook (7th Edition):

Li, Hongyang. “Privacy-preserving authentication and billing for dynamic charging of electric vehicles.” 2016. Web. 01 Oct 2020.

Vancouver:

Li H. Privacy-preserving authentication and billing for dynamic charging of electric vehicles. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/2142/92707.

Council of Science Editors:

Li H. Privacy-preserving authentication and billing for dynamic charging of electric vehicles. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/92707


University of Ontario Institute of Technology

27. Maraj, Amit. Do extroverts create stronger passwords?.

Degree: 2018, University of Ontario Institute of Technology

 We investigate the relationship between personality types and the strength of created and selected passwords. For this purpose, we conducted an experiment on Amazon???s Mechanical… (more)

Subjects/Keywords: Passwords; Personality; Personalities; Password; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maraj, A. (2018). Do extroverts create stronger passwords?. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/917

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Maraj, Amit. “Do extroverts create stronger passwords?.” 2018. Thesis, University of Ontario Institute of Technology. Accessed October 01, 2020. http://hdl.handle.net/10155/917.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Maraj, Amit. “Do extroverts create stronger passwords?.” 2018. Web. 01 Oct 2020.

Vancouver:

Maraj A. Do extroverts create stronger passwords?. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10155/917.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Maraj A. Do extroverts create stronger passwords?. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/917

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Windsor

28. George, Sonia Alice. Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain.

Degree: MS, Computer Science, 2020, University of Windsor

 Vehicular Ad Hoc Network (VANET) is a mobile network formed by vehicles, roadside units, and other infrastructures that enable communication between the nodes to improve… (more)

Subjects/Keywords: Authentication; Blockchain; Identity management; VANET

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

George, S. A. (2020). Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain. (Masters Thesis). University of Windsor. Retrieved from https://scholar.uwindsor.ca/etd/8299

Chicago Manual of Style (16th Edition):

George, Sonia Alice. “Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain.” 2020. Masters Thesis, University of Windsor. Accessed October 01, 2020. https://scholar.uwindsor.ca/etd/8299.

MLA Handbook (7th Edition):

George, Sonia Alice. “Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain.” 2020. Web. 01 Oct 2020.

Vancouver:

George SA. Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain. [Internet] [Masters thesis]. University of Windsor; 2020. [cited 2020 Oct 01]. Available from: https://scholar.uwindsor.ca/etd/8299.

Council of Science Editors:

George SA. Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain. [Masters Thesis]. University of Windsor; 2020. Available from: https://scholar.uwindsor.ca/etd/8299

29. Ralston, Matthew. An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements.

Degree: 2013, California State University – San Marcos

 The DREAM Lesson Plan APP, developed by previous researchers of CSUSM aimed to provide a process for approved K-12 teachers to use when creating lessons.… (more)

Subjects/Keywords: iPad; Authentication; iOS; xcode; json

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ralston, M. (2013). An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.8/335

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ralston, Matthew. “An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. ” 2013. Thesis, California State University – San Marcos. Accessed October 01, 2020. http://hdl.handle.net/10211.8/335.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ralston, Matthew. “An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. ” 2013. Web. 01 Oct 2020.

Vancouver:

Ralston M. An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. [Internet] [Thesis]. California State University – San Marcos; 2013. [cited 2020 Oct 01]. Available from: http://hdl.handle.net/10211.8/335.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ralston M. An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. [Thesis]. California State University – San Marcos; 2013. Available from: http://hdl.handle.net/10211.8/335

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Tennessee – Knoxville

30. Yang, Yingyuan. User Behavior-Based Implicit Authentication.

Degree: 2019, University of Tennessee – Knoxville

 In this work, we proposed dynamic retraining (RU), wind vane module (WVM), BubbleMap (BMap), and reinforcement authentication (RA) to improve the efficacy of implicit authentication(more)

Subjects/Keywords: implicit authentication; mobile computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, Y. (2019). User Behavior-Based Implicit Authentication. (Doctoral Dissertation). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_graddiss/5434

Chicago Manual of Style (16th Edition):

Yang, Yingyuan. “User Behavior-Based Implicit Authentication.” 2019. Doctoral Dissertation, University of Tennessee – Knoxville. Accessed October 01, 2020. https://trace.tennessee.edu/utk_graddiss/5434.

MLA Handbook (7th Edition):

Yang, Yingyuan. “User Behavior-Based Implicit Authentication.” 2019. Web. 01 Oct 2020.

Vancouver:

Yang Y. User Behavior-Based Implicit Authentication. [Internet] [Doctoral dissertation]. University of Tennessee – Knoxville; 2019. [cited 2020 Oct 01]. Available from: https://trace.tennessee.edu/utk_graddiss/5434.

Council of Science Editors:

Yang Y. User Behavior-Based Implicit Authentication. [Doctoral Dissertation]. University of Tennessee – Knoxville; 2019. Available from: https://trace.tennessee.edu/utk_graddiss/5434

[1] [2] [3] [4] [5] … [32]

.