Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Computer networks Access control ). Showing records 1 – 30 of 152163 total matches.

[1] [2] [3] [4] [5] … [5073]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Rutgers University

1. Badar, Nazia, 1983-. Towards automatic configuration of access control.

Degree: PhD, Business and Science, 2016, Rutgers University

Access control provide means to implement organizational security policies to both of its physical and electronic resources. To date, several access control mechanisms, including Role… (more)

Subjects/Keywords: Computers – Access control; Computer networks – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Badar, Nazia, 1. (2016). Towards automatic configuration of access control. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/51547/

Chicago Manual of Style (16th Edition):

Badar, Nazia, 1983-. “Towards automatic configuration of access control.” 2016. Doctoral Dissertation, Rutgers University. Accessed December 15, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/51547/.

MLA Handbook (7th Edition):

Badar, Nazia, 1983-. “Towards automatic configuration of access control.” 2016. Web. 15 Dec 2019.

Vancouver:

Badar, Nazia 1. Towards automatic configuration of access control. [Internet] [Doctoral dissertation]. Rutgers University; 2016. [cited 2019 Dec 15]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51547/.

Council of Science Editors:

Badar, Nazia 1. Towards automatic configuration of access control. [Doctoral Dissertation]. Rutgers University; 2016. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/51547/


Nelson Mandela Metropolitan University

2. Deas, Matthew Burns. Towards a user centric model for identity and access management within the online environment.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University

 Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks… (more)

Subjects/Keywords: Computers  – Access control; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deas, M. B. (2008). Towards a user centric model for identity and access management within the online environment. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed December 15, 2019. http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Deas, Matthew Burns. “Towards a user centric model for identity and access management within the online environment.” 2008. Web. 15 Dec 2019.

Vancouver:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10948/775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Deas MB. Towards a user centric model for identity and access management within the online environment. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

3. Nayak, Ankur Kumar. Flexible access control for campus and enterprise networks.

Degree: MS, Computing, 2010, Georgia Tech

 We consider the problem of designing enterprise network security systems which are easy to manage, robust and flexible. This problem is challenging. Today, most approaches… (more)

Subjects/Keywords: Access control; Security; Enterprise networks; Programmable networks; Computer networks Security measures; Computer networks Management; Computer networks; Local area networks (Computer networks)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nayak, A. K. (2010). Flexible access control for campus and enterprise networks. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/33813

Chicago Manual of Style (16th Edition):

Nayak, Ankur Kumar. “Flexible access control for campus and enterprise networks.” 2010. Masters Thesis, Georgia Tech. Accessed December 15, 2019. http://hdl.handle.net/1853/33813.

MLA Handbook (7th Edition):

Nayak, Ankur Kumar. “Flexible access control for campus and enterprise networks.” 2010. Web. 15 Dec 2019.

Vancouver:

Nayak AK. Flexible access control for campus and enterprise networks. [Internet] [Masters thesis]. Georgia Tech; 2010. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/1853/33813.

Council of Science Editors:

Nayak AK. Flexible access control for campus and enterprise networks. [Masters Thesis]. Georgia Tech; 2010. Available from: http://hdl.handle.net/1853/33813


University of New Mexico

4. Jamkhedkar, Pramod. A framework for usage management.

Degree: Electrical and Computer Engineering, 2011, University of New Mexico

 This thesis proposes a formal framework for usage management in distributed systems. The principles of system design are applied in order to standardize certain features… (more)

Subjects/Keywords: Computer networks – Access control.; Computer networks – Management.; Data protection.; Game theory.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jamkhedkar, P. (2011). A framework for usage management. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/13154

Chicago Manual of Style (16th Edition):

Jamkhedkar, Pramod. “A framework for usage management.” 2011. Doctoral Dissertation, University of New Mexico. Accessed December 15, 2019. http://hdl.handle.net/1928/13154.

MLA Handbook (7th Edition):

Jamkhedkar, Pramod. “A framework for usage management.” 2011. Web. 15 Dec 2019.

Vancouver:

Jamkhedkar P. A framework for usage management. [Internet] [Doctoral dissertation]. University of New Mexico; 2011. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/1928/13154.

Council of Science Editors:

Jamkhedkar P. A framework for usage management. [Doctoral Dissertation]. University of New Mexico; 2011. Available from: http://hdl.handle.net/1928/13154


Nelson Mandela Metropolitan University

5. Yekela, Odwa. Topic map for representing network security competencies.

Degree: 2018, Nelson Mandela Metropolitan University

 Competencies represent the knowledge, skills and attitudes required for job roles. Organisations need to understand and grow competencies within their workforce in order to be… (more)

Subjects/Keywords: Computer networks; Computer networks  – Security measures; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yekela, O. (2018). Topic map for representing network security competencies. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/36368

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yekela, Odwa. “Topic map for representing network security competencies.” 2018. Thesis, Nelson Mandela Metropolitan University. Accessed December 15, 2019. http://hdl.handle.net/10948/36368.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yekela, Odwa. “Topic map for representing network security competencies.” 2018. Web. 15 Dec 2019.

Vancouver:

Yekela O. Topic map for representing network security competencies. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2018. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10948/36368.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yekela O. Topic map for representing network security competencies. [Thesis]. Nelson Mandela Metropolitan University; 2018. Available from: http://hdl.handle.net/10948/36368

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

6. Ellefsen, Ian David. Critical information infrastructure protection for developing countries.

Degree: 2012, University of Johannesburg

D.Phil.(Computer Science)

In this thesis we will investigate the development of Critical Information Infrastructure Protection (CIIP) structures in the developing world. Developing regions are experiencing… (more)

Subjects/Keywords: Computer crimes prevention; Computer security; Computer networks - Access control; Computer networks - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ellefsen, I. D. (2012). Critical information infrastructure protection for developing countries. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5928

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ellefsen, Ian David. “Critical information infrastructure protection for developing countries.” 2012. Thesis, University of Johannesburg. Accessed December 15, 2019. http://hdl.handle.net/10210/5928.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ellefsen, Ian David. “Critical information infrastructure protection for developing countries.” 2012. Web. 15 Dec 2019.

Vancouver:

Ellefsen ID. Critical information infrastructure protection for developing countries. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10210/5928.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ellefsen ID. Critical information infrastructure protection for developing countries. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5928

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New Mexico

7. Lamb, Christopher. Information protection in content-centric networks.

Degree: Electrical and Computer Engineering, 2013, University of New Mexico

 Information-centric networks have distinct advantages with regard to securing sensitive content as a result of their new approaches to managing data in potential future internet… (more)

Subjects/Keywords: Information networks – Access control.; Computer networks – Security measures.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lamb, C. (2013). Information protection in content-centric networks. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/22050

Chicago Manual of Style (16th Edition):

Lamb, Christopher. “Information protection in content-centric networks.” 2013. Doctoral Dissertation, University of New Mexico. Accessed December 15, 2019. http://hdl.handle.net/1928/22050.

MLA Handbook (7th Edition):

Lamb, Christopher. “Information protection in content-centric networks.” 2013. Web. 15 Dec 2019.

Vancouver:

Lamb C. Information protection in content-centric networks. [Internet] [Doctoral dissertation]. University of New Mexico; 2013. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/1928/22050.

Council of Science Editors:

Lamb C. Information protection in content-centric networks. [Doctoral Dissertation]. University of New Mexico; 2013. Available from: http://hdl.handle.net/1928/22050


Hong Kong University of Science and Technology

8. Jmaiel Ep Louati, Abir. Password-authenticated key exchange based on RSA.

Degree: 2016, Hong Kong University of Science and Technology

 Key agreement protocol is an information security technique that allows two or more entities to agree upon a secret key and use it over a… (more)

Subjects/Keywords: Cryptography; Computer networks; Security measures; Computers; Access control; Passwords

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jmaiel Ep Louati, A. (2016). Password-authenticated key exchange based on RSA. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b1590235 ; http://repository.ust.hk/ir/bitstream/1783.1-82382/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jmaiel Ep Louati, Abir. “Password-authenticated key exchange based on RSA.” 2016. Thesis, Hong Kong University of Science and Technology. Accessed December 15, 2019. https://doi.org/10.14711/thesis-b1590235 ; http://repository.ust.hk/ir/bitstream/1783.1-82382/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jmaiel Ep Louati, Abir. “Password-authenticated key exchange based on RSA.” 2016. Web. 15 Dec 2019.

Vancouver:

Jmaiel Ep Louati A. Password-authenticated key exchange based on RSA. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2016. [cited 2019 Dec 15]. Available from: https://doi.org/10.14711/thesis-b1590235 ; http://repository.ust.hk/ir/bitstream/1783.1-82382/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jmaiel Ep Louati A. Password-authenticated key exchange based on RSA. [Thesis]. Hong Kong University of Science and Technology; 2016. Available from: https://doi.org/10.14711/thesis-b1590235 ; http://repository.ust.hk/ir/bitstream/1783.1-82382/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of California – Irvine

9. Wood, Christopher Alphonse. Security and Privacy Challenges in Content-Centric Networks.

Degree: Computer Science, 2017, University of California – Irvine

 Today's Internet is aging. Connections are point-to-point and increasinglyprotected by end-to-end encryption. This reduces security to data transportinstead of data itself. Content-Centric Networking (CCN) is… (more)

Subjects/Keywords: Computer science; Access Control; Content-Centric Networks; Privacy; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wood, C. A. (2017). Security and Privacy Challenges in Content-Centric Networks. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/3741h60n

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wood, Christopher Alphonse. “Security and Privacy Challenges in Content-Centric Networks.” 2017. Thesis, University of California – Irvine. Accessed December 15, 2019. http://www.escholarship.org/uc/item/3741h60n.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wood, Christopher Alphonse. “Security and Privacy Challenges in Content-Centric Networks.” 2017. Web. 15 Dec 2019.

Vancouver:

Wood CA. Security and Privacy Challenges in Content-Centric Networks. [Internet] [Thesis]. University of California – Irvine; 2017. [cited 2019 Dec 15]. Available from: http://www.escholarship.org/uc/item/3741h60n.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wood CA. Security and Privacy Challenges in Content-Centric Networks. [Thesis]. University of California – Irvine; 2017. Available from: http://www.escholarship.org/uc/item/3741h60n

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

10. Van Jaarsveld, Rudi. A prototype to discover and penetrate access restricted web pages in an Extranet.

Degree: 2014, University of Johannesburg

M.Sc. (Information Technology)

The internet grew exponentially over the last decade. With more information available on the web, search engines, with the help of web… (more)

Subjects/Keywords: Web sites - Access control; World Wide Web; Extranets (Computer networks)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Jaarsveld, R. (2014). A prototype to discover and penetrate access restricted web pages in an Extranet. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12390

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Jaarsveld, Rudi. “A prototype to discover and penetrate access restricted web pages in an Extranet.” 2014. Thesis, University of Johannesburg. Accessed December 15, 2019. http://hdl.handle.net/10210/12390.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Jaarsveld, Rudi. “A prototype to discover and penetrate access restricted web pages in an Extranet.” 2014. Web. 15 Dec 2019.

Vancouver:

Van Jaarsveld R. A prototype to discover and penetrate access restricted web pages in an Extranet. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10210/12390.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Jaarsveld R. A prototype to discover and penetrate access restricted web pages in an Extranet. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12390

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

11. Du Plessis, Gerrit Steyn. A model for the evaluation of control with reference to a simple path context model in a UNIX environment.

Degree: 2015, University of Johannesburg

M.Com.

Information and the IT systems that support it are important business assets. Their availability, integrity and confidentiality are essential to maintain an organisations competitive… (more)

Subjects/Keywords: Computer security - Evaluation; UNIX (Computer file); Auditing - Access control; Computer networks - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Du Plessis, G. S. (2015). A model for the evaluation of control with reference to a simple path context model in a UNIX environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/14471

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Du Plessis, Gerrit Steyn. “A model for the evaluation of control with reference to a simple path context model in a UNIX environment.” 2015. Thesis, University of Johannesburg. Accessed December 15, 2019. http://hdl.handle.net/10210/14471.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Du Plessis, Gerrit Steyn. “A model for the evaluation of control with reference to a simple path context model in a UNIX environment.” 2015. Web. 15 Dec 2019.

Vancouver:

Du Plessis GS. A model for the evaluation of control with reference to a simple path context model in a UNIX environment. [Internet] [Thesis]. University of Johannesburg; 2015. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10210/14471.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Du Plessis GS. A model for the evaluation of control with reference to a simple path context model in a UNIX environment. [Thesis]. University of Johannesburg; 2015. Available from: http://hdl.handle.net/10210/14471

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Alruwaili, Fawaz J. The geo-secure system: a secure system for data access based on geographical data.

Degree: MS, Computer Science, 2015, Eastern Washington University

 "Computers have become a basic need for the majority of people around the world. Governments, companies, and individuals have a large number of sensitive information… (more)

Subjects/Keywords: Computer networks – Security measures – Software; GPS receivers; Computer security – Software; Computers – Access control; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alruwaili, F. J. (2015). The geo-secure system: a secure system for data access based on geographical data. (Thesis). Eastern Washington University. Retrieved from https://dc.ewu.edu/theses/276

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alruwaili, Fawaz J. “The geo-secure system: a secure system for data access based on geographical data.” 2015. Thesis, Eastern Washington University. Accessed December 15, 2019. https://dc.ewu.edu/theses/276.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alruwaili, Fawaz J. “The geo-secure system: a secure system for data access based on geographical data.” 2015. Web. 15 Dec 2019.

Vancouver:

Alruwaili FJ. The geo-secure system: a secure system for data access based on geographical data. [Internet] [Thesis]. Eastern Washington University; 2015. [cited 2019 Dec 15]. Available from: https://dc.ewu.edu/theses/276.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alruwaili FJ. The geo-secure system: a secure system for data access based on geographical data. [Thesis]. Eastern Washington University; 2015. Available from: https://dc.ewu.edu/theses/276

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

13. Huang, Caishi. Some open issues in medium access control for next generation wireless networks.

Degree: 2012, Hong Kong University of Science and Technology

 Notorious hidden and exposed terminal problems lead to severe unfair and inefficient utilization of the channel resource in wireless ad hoc networks and wireless LANs.… (more)

Subjects/Keywords: Wireless LANs; Access control; Wireless communication systems; Ad hoc networks (Computer networks)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, C. (2012). Some open issues in medium access control for next generation wireless networks. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b1206089 ; http://repository.ust.hk/ir/bitstream/1783.1-75339/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Caishi. “Some open issues in medium access control for next generation wireless networks.” 2012. Thesis, Hong Kong University of Science and Technology. Accessed December 15, 2019. https://doi.org/10.14711/thesis-b1206089 ; http://repository.ust.hk/ir/bitstream/1783.1-75339/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Caishi. “Some open issues in medium access control for next generation wireless networks.” 2012. Web. 15 Dec 2019.

Vancouver:

Huang C. Some open issues in medium access control for next generation wireless networks. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2012. [cited 2019 Dec 15]. Available from: https://doi.org/10.14711/thesis-b1206089 ; http://repository.ust.hk/ir/bitstream/1783.1-75339/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang C. Some open issues in medium access control for next generation wireless networks. [Thesis]. Hong Kong University of Science and Technology; 2012. Available from: https://doi.org/10.14711/thesis-b1206089 ; http://repository.ust.hk/ir/bitstream/1783.1-75339/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Southern California

14. Subramanian, Sonia. Development and study of access control models for semantic networks.

Degree: MS, Computer Science, 2009, University of Southern California

 This work focuses on developing a feasible access control mechanism for Semantic Networks. As the amount of information grows in quantity, it requires becoming machine… (more)

Subjects/Keywords: access control; semantic networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Subramanian, S. (2009). Development and study of access control models for semantic networks. (Masters Thesis). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/253064/rec/1916

Chicago Manual of Style (16th Edition):

Subramanian, Sonia. “Development and study of access control models for semantic networks.” 2009. Masters Thesis, University of Southern California. Accessed December 15, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/253064/rec/1916.

MLA Handbook (7th Edition):

Subramanian, Sonia. “Development and study of access control models for semantic networks.” 2009. Web. 15 Dec 2019.

Vancouver:

Subramanian S. Development and study of access control models for semantic networks. [Internet] [Masters thesis]. University of Southern California; 2009. [cited 2019 Dec 15]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/253064/rec/1916.

Council of Science Editors:

Subramanian S. Development and study of access control models for semantic networks. [Masters Thesis]. University of Southern California; 2009. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/253064/rec/1916


University of Johannesburg

15. Van Zyl, Pieter Willem Jordaan. MOSS : a model for open system security.

Degree: 2012, University of Johannesburg

Ph.D

This thesis looks at current security problems within open system environments, that is security problems within heterogeneous computer system environments that are interconnected via… (more)

Subjects/Keywords: Computer security - South Africa; Computer networks - Security measures; Security systems - Models.; Computers - Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Zyl, P. W. J. (2012). MOSS : a model for open system security. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7645

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Zyl, Pieter Willem Jordaan. “MOSS : a model for open system security.” 2012. Thesis, University of Johannesburg. Accessed December 15, 2019. http://hdl.handle.net/10210/7645.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Zyl, Pieter Willem Jordaan. “MOSS : a model for open system security.” 2012. Web. 15 Dec 2019.

Vancouver:

Van Zyl PWJ. MOSS : a model for open system security. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10210/7645.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Zyl PWJ. MOSS : a model for open system security. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7645

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Zhen, Jian. Automated Design of Optimal Medium Access Control Protocols for Wireless Networking.

Degree: 2014, University of California – eScholarship, University of California

 We present a framework for the automated design of optimal Medium Access Control (MAC) protocols for wireless networks.First, we describe a methodology that incorporates the… (more)

Subjects/Keywords: Electrical engineering; Computer engineering; Computer science; Automated Design; Medium Access Control; Optimal; Wireless Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhen, J. (2014). Automated Design of Optimal Medium Access Control Protocols for Wireless Networking. (Thesis). University of California – eScholarship, University of California. Retrieved from http://www.escholarship.org/uc/item/4dq6353c

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhen, Jian. “Automated Design of Optimal Medium Access Control Protocols for Wireless Networking.” 2014. Thesis, University of California – eScholarship, University of California. Accessed December 15, 2019. http://www.escholarship.org/uc/item/4dq6353c.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhen, Jian. “Automated Design of Optimal Medium Access Control Protocols for Wireless Networking.” 2014. Web. 15 Dec 2019.

Vancouver:

Zhen J. Automated Design of Optimal Medium Access Control Protocols for Wireless Networking. [Internet] [Thesis]. University of California – eScholarship, University of California; 2014. [cited 2019 Dec 15]. Available from: http://www.escholarship.org/uc/item/4dq6353c.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhen J. Automated Design of Optimal Medium Access Control Protocols for Wireless Networking. [Thesis]. University of California – eScholarship, University of California; 2014. Available from: http://www.escholarship.org/uc/item/4dq6353c

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

17. Serban, Constantin, 1972-. Advances in decentralized and stateful access control.

Degree: PhD, Computer Science, 2008, Rutgers University

The economy and security of modern society relies on increasingly distributed infrastructures and institutions, such as the banking system, government agencies, and commercial enterprises. This… (more)

Subjects/Keywords: Computer networks – Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Serban, Constantin, 1. (2008). Advances in decentralized and stateful access control. (Doctoral Dissertation). Rutgers University. Retrieved from http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.17217

Chicago Manual of Style (16th Edition):

Serban, Constantin, 1972-. “Advances in decentralized and stateful access control.” 2008. Doctoral Dissertation, Rutgers University. Accessed December 15, 2019. http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.17217.

MLA Handbook (7th Edition):

Serban, Constantin, 1972-. “Advances in decentralized and stateful access control.” 2008. Web. 15 Dec 2019.

Vancouver:

Serban, Constantin 1. Advances in decentralized and stateful access control. [Internet] [Doctoral dissertation]. Rutgers University; 2008. [cited 2019 Dec 15]. Available from: http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.17217.

Council of Science Editors:

Serban, Constantin 1. Advances in decentralized and stateful access control. [Doctoral Dissertation]. Rutgers University; 2008. Available from: http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.17217


Florida Atlantic University

18. Gao, WeiZheng. Password-authenticated two-party key exchange with long-term security.

Degree: PhD, 2012, Florida Atlantic University

Summary: In the design of two-party key exchange it is common to rely on a Die-Hellman type hardness assumption in connection with elliptic curves. Unlike… (more)

Subjects/Keywords: Data encryption (Computer science); Computer networks (Security measures); Software protection; Computers – Access control – Passwords

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gao, W. (2012). Password-authenticated two-party key exchange with long-term security. (Doctoral Dissertation). Florida Atlantic University. Retrieved from http://purl.flvc.org/FAU/3342105

Chicago Manual of Style (16th Edition):

Gao, WeiZheng. “Password-authenticated two-party key exchange with long-term security.” 2012. Doctoral Dissertation, Florida Atlantic University. Accessed December 15, 2019. http://purl.flvc.org/FAU/3342105.

MLA Handbook (7th Edition):

Gao, WeiZheng. “Password-authenticated two-party key exchange with long-term security.” 2012. Web. 15 Dec 2019.

Vancouver:

Gao W. Password-authenticated two-party key exchange with long-term security. [Internet] [Doctoral dissertation]. Florida Atlantic University; 2012. [cited 2019 Dec 15]. Available from: http://purl.flvc.org/FAU/3342105.

Council of Science Editors:

Gao W. Password-authenticated two-party key exchange with long-term security. [Doctoral Dissertation]. Florida Atlantic University; 2012. Available from: http://purl.flvc.org/FAU/3342105


Anna University

19. Duraipangian, N. METHODOLOGIES FOR SECURE INFORMATION SYSTEM DESIGN FOR ORGANIZATIONS.

Degree: Computer science, 2009, Anna University

Computer networks are increasingly being used by organizations to newlineeliminate the use of paper in their offices. Along with this increased usage of newlinecomputers comes… (more)

Subjects/Keywords: ask based access control (TBAC); classification schemes; Computer networks; control models; discretionary access control (DAC); mandatory access control (MAC); methodologies; organization; project

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Duraipangian, N. (2009). METHODOLOGIES FOR SECURE INFORMATION SYSTEM DESIGN FOR ORGANIZATIONS. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/17507

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Duraipangian, N. “METHODOLOGIES FOR SECURE INFORMATION SYSTEM DESIGN FOR ORGANIZATIONS.” 2009. Thesis, Anna University. Accessed December 15, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/17507.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Duraipangian, N. “METHODOLOGIES FOR SECURE INFORMATION SYSTEM DESIGN FOR ORGANIZATIONS.” 2009. Web. 15 Dec 2019.

Vancouver:

Duraipangian N. METHODOLOGIES FOR SECURE INFORMATION SYSTEM DESIGN FOR ORGANIZATIONS. [Internet] [Thesis]. Anna University; 2009. [cited 2019 Dec 15]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/17507.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Duraipangian N. METHODOLOGIES FOR SECURE INFORMATION SYSTEM DESIGN FOR ORGANIZATIONS. [Thesis]. Anna University; 2009. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/17507

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

20. Lourens, Jacques Ernst. Establishing and controlling remote access to corporate networks.

Degree: 2012, University of Johannesburg

M.Comm.

The problem of establishing and controlling remote access to corporate networks has become one of the most difficult issues facing network administrators and information… (more)

Subjects/Keywords: Computer networks - Remote access

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lourens, J. E. (2012). Establishing and controlling remote access to corporate networks. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5483

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lourens, Jacques Ernst. “Establishing and controlling remote access to corporate networks.” 2012. Thesis, University of Johannesburg. Accessed December 15, 2019. http://hdl.handle.net/10210/5483.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lourens, Jacques Ernst. “Establishing and controlling remote access to corporate networks.” 2012. Web. 15 Dec 2019.

Vancouver:

Lourens JE. Establishing and controlling remote access to corporate networks. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10210/5483.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lourens JE. Establishing and controlling remote access to corporate networks. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5483

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rhodes University

21. Irwin, Barry Vivian William. A framework for the application of network telescope sensors in a global IP network.

Degree: Faculty of Science, Computer Science, 2011, Rhodes University

 The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of… (more)

Subjects/Keywords: Sensor networks; Computer networks; TCP/IP (Computer network protocol); Internet; Computer security; Computers  – Access control; Computer networks  – Security measures; Computer viruses; Malware (Computer software)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Irwin, B. V. W. (2011). A framework for the application of network telescope sensors in a global IP network. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1004835

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Irwin, Barry Vivian William. “A framework for the application of network telescope sensors in a global IP network.” 2011. Thesis, Rhodes University. Accessed December 15, 2019. http://hdl.handle.net/10962/d1004835.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Irwin, Barry Vivian William. “A framework for the application of network telescope sensors in a global IP network.” 2011. Web. 15 Dec 2019.

Vancouver:

Irwin BVW. A framework for the application of network telescope sensors in a global IP network. [Internet] [Thesis]. Rhodes University; 2011. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10962/d1004835.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Irwin BVW. A framework for the application of network telescope sensors in a global IP network. [Thesis]. Rhodes University; 2011. Available from: http://hdl.handle.net/10962/d1004835

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Clemson University

22. Wolf, Brian. CROSS-LAYER SCHEDULING PROTOCOLS FOR MOBILE AD HOC NETWORKS USING ADAPTIVE DIRECT-SEQUENCE SPREAD-SPECTRUM MODULATION.

Degree: PhD, Electrical Engineering, 2010, Clemson University

 We investigate strategies to improve the performance of transmission schedules for mobile ad hoc networks (MANETs) employing adaptive direct-sequence spread-spectrum (DSSS) modulation. Previously, scheduling protocols… (more)

Subjects/Keywords: Ad Hoc Networks; Medium Access Control; Spread Spectrum; TDMA; Wireless Communications; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wolf, B. (2010). CROSS-LAYER SCHEDULING PROTOCOLS FOR MOBILE AD HOC NETWORKS USING ADAPTIVE DIRECT-SEQUENCE SPREAD-SPECTRUM MODULATION. (Doctoral Dissertation). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_dissertations/545

Chicago Manual of Style (16th Edition):

Wolf, Brian. “CROSS-LAYER SCHEDULING PROTOCOLS FOR MOBILE AD HOC NETWORKS USING ADAPTIVE DIRECT-SEQUENCE SPREAD-SPECTRUM MODULATION.” 2010. Doctoral Dissertation, Clemson University. Accessed December 15, 2019. https://tigerprints.clemson.edu/all_dissertations/545.

MLA Handbook (7th Edition):

Wolf, Brian. “CROSS-LAYER SCHEDULING PROTOCOLS FOR MOBILE AD HOC NETWORKS USING ADAPTIVE DIRECT-SEQUENCE SPREAD-SPECTRUM MODULATION.” 2010. Web. 15 Dec 2019.

Vancouver:

Wolf B. CROSS-LAYER SCHEDULING PROTOCOLS FOR MOBILE AD HOC NETWORKS USING ADAPTIVE DIRECT-SEQUENCE SPREAD-SPECTRUM MODULATION. [Internet] [Doctoral dissertation]. Clemson University; 2010. [cited 2019 Dec 15]. Available from: https://tigerprints.clemson.edu/all_dissertations/545.

Council of Science Editors:

Wolf B. CROSS-LAYER SCHEDULING PROTOCOLS FOR MOBILE AD HOC NETWORKS USING ADAPTIVE DIRECT-SEQUENCE SPREAD-SPECTRUM MODULATION. [Doctoral Dissertation]. Clemson University; 2010. Available from: https://tigerprints.clemson.edu/all_dissertations/545


University of Arizona

23. Zhang, Yan. Secure and Spectrally-Efficient Channel Access in Multi-Channel Wireless Networks .

Degree: 2015, University of Arizona

 Wireless services have become an indispensable part of our social, economic, and everyday activities. They have facilitated and continue to facilitate rapid access to information… (more)

Subjects/Keywords: Jamming; Medium access control; Multi channel; Security; Wireless networks; Electrical & Computer Engineering; Full duplex

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Y. (2015). Secure and Spectrally-Efficient Channel Access in Multi-Channel Wireless Networks . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/577214

Chicago Manual of Style (16th Edition):

Zhang, Yan. “Secure and Spectrally-Efficient Channel Access in Multi-Channel Wireless Networks .” 2015. Doctoral Dissertation, University of Arizona. Accessed December 15, 2019. http://hdl.handle.net/10150/577214.

MLA Handbook (7th Edition):

Zhang, Yan. “Secure and Spectrally-Efficient Channel Access in Multi-Channel Wireless Networks .” 2015. Web. 15 Dec 2019.

Vancouver:

Zhang Y. Secure and Spectrally-Efficient Channel Access in Multi-Channel Wireless Networks . [Internet] [Doctoral dissertation]. University of Arizona; 2015. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10150/577214.

Council of Science Editors:

Zhang Y. Secure and Spectrally-Efficient Channel Access in Multi-Channel Wireless Networks . [Doctoral Dissertation]. University of Arizona; 2015. Available from: http://hdl.handle.net/10150/577214


University of Ballarat

24. Lobo, Desmond. Rapid identification of rootkit infections using data mining.

Degree: Doctor of Philsophy, 2010, University of Ballarat

"The main part of this thesis presents a new approach to the topic of conjugation, with applications to various optimization problems. It does so by introducing (what we call) G-coupling functions."

Doctor of Philsophy

Subjects/Keywords: Australian Digital Thesis; Computers; Access control; Computer networks (Security measures); Computer security; Operating systems (Computers); Computer viruses; Computer hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lobo, D. (2010). Rapid identification of rootkit infections using data mining. (Doctoral Dissertation). University of Ballarat. Retrieved from http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816

Chicago Manual of Style (16th Edition):

Lobo, Desmond. “Rapid identification of rootkit infections using data mining.” 2010. Doctoral Dissertation, University of Ballarat. Accessed December 15, 2019. http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816.

MLA Handbook (7th Edition):

Lobo, Desmond. “Rapid identification of rootkit infections using data mining.” 2010. Web. 15 Dec 2019.

Vancouver:

Lobo D. Rapid identification of rootkit infections using data mining. [Internet] [Doctoral dissertation]. University of Ballarat; 2010. [cited 2019 Dec 15]. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816.

Council of Science Editors:

Lobo D. Rapid identification of rootkit infections using data mining. [Doctoral Dissertation]. University of Ballarat; 2010. Available from: http://researchonline.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/44038 ; http://innopac.ballarat.edu.au/record=b1555816


University of Ballarat

25. Lobo, Desmond. Rapid identification of rootkit infections using data mining.

Degree: Doctor of Philsophy, 2010, University of Ballarat

"The main part of this thesis presents a new approach to the topic of conjugation, with applications to various optimization problems. It does so by introducing (what we call) G-coupling functions."

Doctor of Philsophy

Subjects/Keywords: Australian Digital Thesis; Computers; Access control; Computer networks (Security measures); Computer security; Operating systems (Computers); Computer viruses; Computer hackers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lobo, D. (2010). Rapid identification of rootkit infections using data mining. (Doctoral Dissertation). University of Ballarat. Retrieved from http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/44308 ; http://library.federation.edu.au/record=b1555816

Chicago Manual of Style (16th Edition):

Lobo, Desmond. “Rapid identification of rootkit infections using data mining.” 2010. Doctoral Dissertation, University of Ballarat. Accessed December 15, 2019. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/44308 ; http://library.federation.edu.au/record=b1555816.

MLA Handbook (7th Edition):

Lobo, Desmond. “Rapid identification of rootkit infections using data mining.” 2010. Web. 15 Dec 2019.

Vancouver:

Lobo D. Rapid identification of rootkit infections using data mining. [Internet] [Doctoral dissertation]. University of Ballarat; 2010. [cited 2019 Dec 15]. Available from: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/44308 ; http://library.federation.edu.au/record=b1555816.

Council of Science Editors:

Lobo D. Rapid identification of rootkit infections using data mining. [Doctoral Dissertation]. University of Ballarat; 2010. Available from: http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/44308 ; http://library.federation.edu.au/record=b1555816


Rhodes University

26. Duff, Kevin Craig. Network-layer reservation TDM for ad-hoc 802.11 networks.

Degree: Faculty of Science, Computer Science, 2008, Rhodes University

 Ad-Hoc mesh networks offer great promise. Low-cost ad-hoc mesh networks can be built using popular IEEE 802.11 equipment, but such networks are unable to guarantee… (more)

Subjects/Keywords: Computer networks  – Access control; Computers  – Access control; Computer networks  – Management; Time division multiple access; Ad hoc networks (Computer networks)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Duff, K. C. (2008). Network-layer reservation TDM for ad-hoc 802.11 networks. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1002773

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Duff, Kevin Craig. “Network-layer reservation TDM for ad-hoc 802.11 networks.” 2008. Thesis, Rhodes University. Accessed December 15, 2019. http://hdl.handle.net/10962/d1002773.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Duff, Kevin Craig. “Network-layer reservation TDM for ad-hoc 802.11 networks.” 2008. Web. 15 Dec 2019.

Vancouver:

Duff KC. Network-layer reservation TDM for ad-hoc 802.11 networks. [Internet] [Thesis]. Rhodes University; 2008. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10962/d1002773.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Duff KC. Network-layer reservation TDM for ad-hoc 802.11 networks. [Thesis]. Rhodes University; 2008. Available from: http://hdl.handle.net/10962/d1002773

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Florida Atlantic University

27. Mithila, Shifat P. A Study on Partially Homomorphic Encryption Schemes.

Degree: MS, 2017, Florida Atlantic University

Summary: High processing time and implementation complexity of the fully homomorphic encryption schemes intrigued cryptographers to extend partially homomorphic encryption schemes to allow homomorphic computation… (more)

Subjects/Keywords: Computer networks – Security measures.; Computer security.; Computers – Access control – Code words.; Cyberinfrastructure.; Computer network architectures.; Cryptography.; Number theory – Data processing.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mithila, S. P. (2017). A Study on Partially Homomorphic Encryption Schemes. (Masters Thesis). Florida Atlantic University. Retrieved from http://purl.flvc.org/fau/fd/FA00004840 ; (URL) http://purl.flvc.org/fau/fd/FA00004840

Chicago Manual of Style (16th Edition):

Mithila, Shifat P. “A Study on Partially Homomorphic Encryption Schemes.” 2017. Masters Thesis, Florida Atlantic University. Accessed December 15, 2019. http://purl.flvc.org/fau/fd/FA00004840 ; (URL) http://purl.flvc.org/fau/fd/FA00004840.

MLA Handbook (7th Edition):

Mithila, Shifat P. “A Study on Partially Homomorphic Encryption Schemes.” 2017. Web. 15 Dec 2019.

Vancouver:

Mithila SP. A Study on Partially Homomorphic Encryption Schemes. [Internet] [Masters thesis]. Florida Atlantic University; 2017. [cited 2019 Dec 15]. Available from: http://purl.flvc.org/fau/fd/FA00004840 ; (URL) http://purl.flvc.org/fau/fd/FA00004840.

Council of Science Editors:

Mithila SP. A Study on Partially Homomorphic Encryption Schemes. [Masters Thesis]. Florida Atlantic University; 2017. Available from: http://purl.flvc.org/fau/fd/FA00004840 ; (URL) http://purl.flvc.org/fau/fd/FA00004840


University of Johannesburg

28. Von Solms, Johan Sebastiaan. MOFAC : model for fine grained access control.

Degree: 2014, University of Johannesburg

M.Sc. (Computer Science)

Computer security is a key component in any computer system. Traditionally computers were not connected to one another. This centralized configuration made… (more)

Subjects/Keywords: Computers - Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, J. S. (2014). MOFAC : model for fine grained access control. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Thesis, University of Johannesburg. Accessed December 15, 2019. http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Johan Sebastiaan. “MOFAC : model for fine grained access control.” 2014. Web. 15 Dec 2019.

Vancouver:

Von Solms JS. MOFAC : model for fine grained access control. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10210/12035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms JS. MOFAC : model for fine grained access control. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

29. Uzun, Emre. Formal security analysis of access control models and their spatiotemporal extensions.

Degree: PhD, Management, 2015, Rutgers University

Providing restrictive and secure access to resources is a challenging and socially important problem. Today, there exists a variety of formal security models to meet… (more)

Subjects/Keywords: Access control; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Uzun, E. (2015). Formal security analysis of access control models and their spatiotemporal extensions. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/48785/

Chicago Manual of Style (16th Edition):

Uzun, Emre. “Formal security analysis of access control models and their spatiotemporal extensions.” 2015. Doctoral Dissertation, Rutgers University. Accessed December 15, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/48785/.

MLA Handbook (7th Edition):

Uzun, Emre. “Formal security analysis of access control models and their spatiotemporal extensions.” 2015. Web. 15 Dec 2019.

Vancouver:

Uzun E. Formal security analysis of access control models and their spatiotemporal extensions. [Internet] [Doctoral dissertation]. Rutgers University; 2015. [cited 2019 Dec 15]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48785/.

Council of Science Editors:

Uzun E. Formal security analysis of access control models and their spatiotemporal extensions. [Doctoral Dissertation]. Rutgers University; 2015. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/48785/


University of Arizona

30. Hsu, Chilo Gerald, 1959-. CRYPTOGRAPHIC PROTECTION IN A TYPE 10BASE5 LOCAL AREA NETWORK INTERFACE .

Degree: 1986, University of Arizona

Subjects/Keywords: Computers  – Access control.; Local area networks (Computer networks)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, Chilo Gerald, 1. (1986). CRYPTOGRAPHIC PROTECTION IN A TYPE 10BASE5 LOCAL AREA NETWORK INTERFACE . (Masters Thesis). University of Arizona. Retrieved from http://hdl.handle.net/10150/277192

Chicago Manual of Style (16th Edition):

Hsu, Chilo Gerald, 1959-. “CRYPTOGRAPHIC PROTECTION IN A TYPE 10BASE5 LOCAL AREA NETWORK INTERFACE .” 1986. Masters Thesis, University of Arizona. Accessed December 15, 2019. http://hdl.handle.net/10150/277192.

MLA Handbook (7th Edition):

Hsu, Chilo Gerald, 1959-. “CRYPTOGRAPHIC PROTECTION IN A TYPE 10BASE5 LOCAL AREA NETWORK INTERFACE .” 1986. Web. 15 Dec 2019.

Vancouver:

Hsu, Chilo Gerald 1. CRYPTOGRAPHIC PROTECTION IN A TYPE 10BASE5 LOCAL AREA NETWORK INTERFACE . [Internet] [Masters thesis]. University of Arizona; 1986. [cited 2019 Dec 15]. Available from: http://hdl.handle.net/10150/277192.

Council of Science Editors:

Hsu, Chilo Gerald 1. CRYPTOGRAPHIC PROTECTION IN A TYPE 10BASE5 LOCAL AREA NETWORK INTERFACE . [Masters Thesis]. University of Arizona; 1986. Available from: http://hdl.handle.net/10150/277192

[1] [2] [3] [4] [5] … [5073]

.