Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(DATENSICHERHEIT DATENSCHUTZ BETRIEBSSYSTEME ). Showing records 1 – 30 of 263 total matches.

[1] [2] [3] [4] [5] [6] [7] [8] [9]

Search Limiters

Last 2 Years | English Only

Universities

Languages

Country

▼ Search Limiters


ETH Zürich

1. Staub, Cedric. Adding support for user-defined sorts and sorted function symbols to Tamarin.

Degree: 2013, ETH Zürich

 A security protocol is an exchange of messages between multiple parties with the intent of achieving certain security properties, such as confidentiality of message contents… (more)

Subjects/Keywords: CODIERUNG (INFORMATIONSTHEORIE); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); CODING (INFORMATION THEORY); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Staub, C. (2013). Adding support for user-defined sorts and sorted function symbols to Tamarin. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/73721

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Staub, Cedric. “Adding support for user-defined sorts and sorted function symbols to Tamarin.” 2013. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/73721.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Staub, Cedric. “Adding support for user-defined sorts and sorted function symbols to Tamarin.” 2013. Web. 22 Jan 2020.

Vancouver:

Staub C. Adding support for user-defined sorts and sorted function symbols to Tamarin. [Internet] [Thesis]. ETH Zürich; 2013. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/73721.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Staub C. Adding support for user-defined sorts and sorted function symbols to Tamarin. [Thesis]. ETH Zürich; 2013. Available from: http://hdl.handle.net/20.500.11850/73721

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

2. Holenstein, Thomas. Strengthening key agreement using hard-core sets.

Degree: 2006, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Holenstein, T. (2006). Strengthening key agreement using hard-core sets. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/2607

Chicago Manual of Style (16th Edition):

Holenstein, Thomas. “Strengthening key agreement using hard-core sets.” 2006. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/2607.

MLA Handbook (7th Edition):

Holenstein, Thomas. “Strengthening key agreement using hard-core sets.” 2006. Web. 22 Jan 2020.

Vancouver:

Holenstein T. Strengthening key agreement using hard-core sets. [Internet] [Doctoral dissertation]. ETH Zürich; 2006. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/2607.

Council of Science Editors:

Holenstein T. Strengthening key agreement using hard-core sets. [Doctoral Dissertation]. ETH Zürich; 2006. Available from: http://hdl.handle.net/20.500.11850/2607


ETH Zürich

3. Beaudry, Normand J. Assumptions in quantum cryptography.

Degree: 2014, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); QUANTUM CRYPTOGRAPHY (INFORMATION THEORY); QUANTENKRYPTOGRAPHIE (INFORMATIONSTHEORIE); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/530; Physics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beaudry, N. J. (2014). Assumptions in quantum cryptography. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/100541

Chicago Manual of Style (16th Edition):

Beaudry, Normand J. “Assumptions in quantum cryptography.” 2014. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/100541.

MLA Handbook (7th Edition):

Beaudry, Normand J. “Assumptions in quantum cryptography.” 2014. Web. 22 Jan 2020.

Vancouver:

Beaudry NJ. Assumptions in quantum cryptography. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/100541.

Council of Science Editors:

Beaudry NJ. Assumptions in quantum cryptography. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/100541


ETH Zürich

4. Sevinç, Paul Ersin. Securing information by controlling access to data in documents.

Degree: 2007, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); ACCESS (OPERATING SYSTEMS); ELECTRONIC PUBLISHING + DESKTOP PUBLISHING; ZUGRIFF (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sevinç, P. E. (2007). Securing information by controlling access to data in documents. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72764

Chicago Manual of Style (16th Edition):

Sevinç, Paul Ersin. “Securing information by controlling access to data in documents.” 2007. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/72764.

MLA Handbook (7th Edition):

Sevinç, Paul Ersin. “Securing information by controlling access to data in documents.” 2007. Web. 22 Jan 2020.

Vancouver:

Sevinç PE. Securing information by controlling access to data in documents. [Internet] [Doctoral dissertation]. ETH Zürich; 2007. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/72764.

Council of Science Editors:

Sevinç PE. Securing information by controlling access to data in documents. [Doctoral Dissertation]. ETH Zürich; 2007. Available from: http://hdl.handle.net/20.500.11850/72764


ETH Zürich

5. Lüssi, Cécile. Signature-based extrusion detection.

Degree: 2008, ETH Zürich

Subjects/Keywords: ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lüssi, C. (2008). Signature-based extrusion detection. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150670

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lüssi, Cécile. “Signature-based extrusion detection.” 2008. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/150670.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lüssi, Cécile. “Signature-based extrusion detection.” 2008. Web. 22 Jan 2020.

Vancouver:

Lüssi C. Signature-based extrusion detection. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/150670.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lüssi C. Signature-based extrusion detection. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150670

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

6. Yu, Der-Yeuan. USB Communication Security: Threats and Countermeasures.

Degree: 2012, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); DATA BUSES + FIELD BUSES (DATA TRANSMISSION); DATENBUSSE + FELDBUSSE (DATENÜBERTRAGUNG); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, D. (2012). USB Communication Security: Threats and Countermeasures. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/115272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Der-Yeuan. “USB Communication Security: Threats and Countermeasures.” 2012. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/115272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Der-Yeuan. “USB Communication Security: Threats and Countermeasures.” 2012. Web. 22 Jan 2020.

Vancouver:

Yu D. USB Communication Security: Threats and Countermeasures. [Internet] [Thesis]. ETH Zürich; 2012. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/115272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu D. USB Communication Security: Threats and Countermeasures. [Thesis]. ETH Zürich; 2012. Available from: http://hdl.handle.net/20.500.11850/115272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

7. Montalto, Bruno C. Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis.

Degree: 2014, ETH Zürich

Subjects/Keywords: VERIFICATION (SOFTWARE ENGINEERING); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); VERIFIKATION (SOFTWARE ENGINEERING); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Montalto, B. C. (2014). Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/96309

Chicago Manual of Style (16th Edition):

Montalto, Bruno C. “Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis.” 2014. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/96309.

MLA Handbook (7th Edition):

Montalto, Bruno C. “Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis.” 2014. Web. 22 Jan 2020.

Vancouver:

Montalto BC. Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/96309.

Council of Science Editors:

Montalto BC. Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/96309


ETH Zürich

8. Mödersheim, Sebastian A. Models and methods for the automated analysis of security protocols.

Degree: 2007, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mödersheim, S. A. (2007). Models and methods for the automated analysis of security protocols. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/4063

Chicago Manual of Style (16th Edition):

Mödersheim, Sebastian A. “Models and methods for the automated analysis of security protocols.” 2007. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/4063.

MLA Handbook (7th Edition):

Mödersheim, Sebastian A. “Models and methods for the automated analysis of security protocols.” 2007. Web. 22 Jan 2020.

Vancouver:

Mödersheim SA. Models and methods for the automated analysis of security protocols. [Internet] [Doctoral dissertation]. ETH Zürich; 2007. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/4063.

Council of Science Editors:

Mödersheim SA. Models and methods for the automated analysis of security protocols. [Doctoral Dissertation]. ETH Zürich; 2007. Available from: http://hdl.handle.net/20.500.11850/4063


ETH Zürich

9. Lai, Xuejia. On the design and security of block ciphers.

Degree: 1992, ETH Zürich

Subjects/Keywords: KRYPTOGRAPHIE + GEHEIMSCHRIFTEN; DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); CRYPTOGRAPHY + CYPHERS + CODES; DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lai, X. (1992). On the design and security of block ciphers. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/140723

Chicago Manual of Style (16th Edition):

Lai, Xuejia. “On the design and security of block ciphers.” 1992. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/140723.

MLA Handbook (7th Edition):

Lai, Xuejia. “On the design and security of block ciphers.” 1992. Web. 22 Jan 2020.

Vancouver:

Lai X. On the design and security of block ciphers. [Internet] [Doctoral dissertation]. ETH Zürich; 1992. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/140723.

Council of Science Editors:

Lai X. On the design and security of block ciphers. [Doctoral Dissertation]. ETH Zürich; 1992. Available from: http://hdl.handle.net/20.500.11850/140723


ETH Zürich

10. Grüter, Martin. Security and multi user support for BioOpera.

Degree: 2002, ETH Zürich

Subjects/Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); DATENKOMMUNIKATION (COMPUTERSYSTEME); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); DATA COMMUNICATIONS (COMPUTER SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grüter, M. (2002). Security and multi user support for BioOpera. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/146774

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Grüter, Martin. “Security and multi user support for BioOpera.” 2002. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/146774.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Grüter, Martin. “Security and multi user support for BioOpera.” 2002. Web. 22 Jan 2020.

Vancouver:

Grüter M. Security and multi user support for BioOpera. [Internet] [Thesis]. ETH Zürich; 2002. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/146774.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Grüter M. Security and multi user support for BioOpera. [Thesis]. ETH Zürich; 2002. Available from: http://hdl.handle.net/20.500.11850/146774

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

11. Raftopoulos, Ilias. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections.

Degree: 2014, ETH Zürich

Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); COMPUTER CRIMINALITY + CYBERCRIMINALITY (CRIMINAL LAW); COMPUTERKRIMINALITÄT + CYBERKRIMINALITÄT (STRAFRECHT); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Raftopoulos, I. (2014). Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/91060

Chicago Manual of Style (16th Edition):

Raftopoulos, Ilias. “Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections.” 2014. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/91060.

MLA Handbook (7th Edition):

Raftopoulos, Ilias. “Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections.” 2014. Web. 22 Jan 2020.

Vancouver:

Raftopoulos I. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/91060.

Council of Science Editors:

Raftopoulos I. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/91060


ETH Zürich

12. Feltz, Michèle. Strengthening the security of key exchange protocols.

Degree: 2014, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); CRYPTOGRAPHY (INFORMATION THEORY); AUTHENTIFICATION (OPERATING SYSTEMS); KRYPTOGRAPHIE (INFORMATIONSTHEORIE); AUTHENTIFIKATION (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/510; Data processing, computer science; Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Feltz, M. (2014). Strengthening the security of key exchange protocols. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/84662

Chicago Manual of Style (16th Edition):

Feltz, Michèle. “Strengthening the security of key exchange protocols.” 2014. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/84662.

MLA Handbook (7th Edition):

Feltz, Michèle. “Strengthening the security of key exchange protocols.” 2014. Web. 22 Jan 2020.

Vancouver:

Feltz M. Strengthening the security of key exchange protocols. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/84662.

Council of Science Editors:

Feltz M. Strengthening the security of key exchange protocols. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/84662


ETH Zürich

13. Frau, Simone. Analysis of reachability properties in communicating authorization policies.

Degree: 2012, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); DATA COMMUNICATIONS (COMPUTER SYSTEMS); DATENKOMMUNIKATION (COMPUTERSYSTEME); CRYPTOGRAPHY (INFORMATION THEORY); AUTHENTIFICATION (OPERATING SYSTEMS); KRYPTOGRAPHIE (INFORMATIONSTHEORIE); AUTHENTIFIKATION (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frau, S. (2012). Analysis of reachability properties in communicating authorization policies. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72816

Chicago Manual of Style (16th Edition):

Frau, Simone. “Analysis of reachability properties in communicating authorization policies.” 2012. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/72816.

MLA Handbook (7th Edition):

Frau, Simone. “Analysis of reachability properties in communicating authorization policies.” 2012. Web. 22 Jan 2020.

Vancouver:

Frau S. Analysis of reachability properties in communicating authorization policies. [Internet] [Doctoral dissertation]. ETH Zürich; 2012. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/72816.

Council of Science Editors:

Frau S. Analysis of reachability properties in communicating authorization policies. [Doctoral Dissertation]. ETH Zürich; 2012. Available from: http://hdl.handle.net/20.500.11850/72816


ETH Zürich

14. Pöpper, Christina. A security analyzer for multi-threaded programs.

Degree: 2005, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); MULTIPROCESSING + MULTIPROGRAMMING + MULTITASKING (OPERATING SYSTEMS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); MEHRPROGRAMMBETRIEB (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pöpper, C. (2005). A security analyzer for multi-threaded programs. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/148524

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pöpper, Christina. “A security analyzer for multi-threaded programs.” 2005. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/148524.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pöpper, Christina. “A security analyzer for multi-threaded programs.” 2005. Web. 22 Jan 2020.

Vancouver:

Pöpper C. A security analyzer for multi-threaded programs. [Internet] [Thesis]. ETH Zürich; 2005. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/148524.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pöpper C. A security analyzer for multi-threaded programs. [Thesis]. ETH Zürich; 2005. Available from: http://hdl.handle.net/20.500.11850/148524

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

15. Jotterand, Arnaud. Usage control in secure messaging.

Degree: 2008, ETH Zürich

Subjects/Keywords: NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jotterand, A. (2008). Usage control in secure messaging. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150366

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jotterand, Arnaud. “Usage control in secure messaging.” 2008. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/150366.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jotterand, Arnaud. “Usage control in secure messaging.” 2008. Web. 22 Jan 2020.

Vancouver:

Jotterand A. Usage control in secure messaging. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/150366.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jotterand A. Usage control in secure messaging. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150366

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

16. Nguyen, Binh Thanh. Sound Abstractions for Security Protocol Verification.

Degree: 2015, ETH Zürich

Subjects/Keywords: VERIFIKATION (SOFTWARE ENGINEERING); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); VERIFICATION (SOFTWARE ENGINEERING); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, B. T. (2015). Sound Abstractions for Security Protocol Verification. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/155236

Chicago Manual of Style (16th Edition):

Nguyen, Binh Thanh. “Sound Abstractions for Security Protocol Verification.” 2015. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/155236.

MLA Handbook (7th Edition):

Nguyen, Binh Thanh. “Sound Abstractions for Security Protocol Verification.” 2015. Web. 22 Jan 2020.

Vancouver:

Nguyen BT. Sound Abstractions for Security Protocol Verification. [Internet] [Doctoral dissertation]. ETH Zürich; 2015. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/155236.

Council of Science Editors:

Nguyen BT. Sound Abstractions for Security Protocol Verification. [Doctoral Dissertation]. ETH Zürich; 2015. Available from: http://hdl.handle.net/20.500.11850/155236


ETH Zürich

17. Langheinrich, Marc. Personal privacy in ubiquitous computing: Tools and system support.

Degree: 2005, ETH Zürich

 Visions of future computing environments involve integrating tiny microelectronic processors and sensors into everyday objects in order to make them "smart." Smart things can explore… (more)

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); PERVASIVE COMPUTING + UBIQUITOUS COMPUTING (COMPUTER SYSTEMS); PERVASIVE COMPUTING + UBIQUITOUS COMPUTING (COMPUTERSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Langheinrich, M. (2005). Personal privacy in ubiquitous computing: Tools and system support. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/51581

Chicago Manual of Style (16th Edition):

Langheinrich, Marc. “Personal privacy in ubiquitous computing: Tools and system support.” 2005. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/51581.

MLA Handbook (7th Edition):

Langheinrich, Marc. “Personal privacy in ubiquitous computing: Tools and system support.” 2005. Web. 22 Jan 2020.

Vancouver:

Langheinrich M. Personal privacy in ubiquitous computing: Tools and system support. [Internet] [Doctoral dissertation]. ETH Zürich; 2005. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/51581.

Council of Science Editors:

Langheinrich M. Personal privacy in ubiquitous computing: Tools and system support. [Doctoral Dissertation]. ETH Zürich; 2005. Available from: http://hdl.handle.net/20.500.11850/51581


ETH Zürich

18. Meier, Simon. Advancing automated security protocol verification.

Degree: 2013, ETH Zürich

Subjects/Keywords: CODIERUNG (INFORMATIONSTHEORIE); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); CODING (INFORMATION THEORY); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meier, S. (2013). Advancing automated security protocol verification. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/66840

Chicago Manual of Style (16th Edition):

Meier, Simon. “Advancing automated security protocol verification.” 2013. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/66840.

MLA Handbook (7th Edition):

Meier, Simon. “Advancing automated security protocol verification.” 2013. Web. 22 Jan 2020.

Vancouver:

Meier S. Advancing automated security protocol verification. [Internet] [Doctoral dissertation]. ETH Zürich; 2013. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/66840.

Council of Science Editors:

Meier S. Advancing automated security protocol verification. [Doctoral Dissertation]. ETH Zürich; 2013. Available from: http://hdl.handle.net/20.500.11850/66840


ETH Zürich

19. Dübendorfer, Thomas. Impact analysis, early detection and mitigation of large-scale internet attacks.

Degree: 2005, ETH Zürich

Subjects/Keywords: INTERNET + WORLD WIDE WEB (COMPUTER SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); INTERNET + WORLD WIDE WEB (COMPUTERSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dübendorfer, T. (2005). Impact analysis, early detection and mitigation of large-scale internet attacks. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/85436

Chicago Manual of Style (16th Edition):

Dübendorfer, Thomas. “Impact analysis, early detection and mitigation of large-scale internet attacks.” 2005. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/85436.

MLA Handbook (7th Edition):

Dübendorfer, Thomas. “Impact analysis, early detection and mitigation of large-scale internet attacks.” 2005. Web. 22 Jan 2020.

Vancouver:

Dübendorfer T. Impact analysis, early detection and mitigation of large-scale internet attacks. [Internet] [Doctoral dissertation]. ETH Zürich; 2005. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/85436.

Council of Science Editors:

Dübendorfer T. Impact analysis, early detection and mitigation of large-scale internet attacks. [Doctoral Dissertation]. ETH Zürich; 2005. Available from: http://hdl.handle.net/20.500.11850/85436


ETH Zürich

20. Tessaro, Stefano M. Computational Indistinguishability Amplification.

Degree: 2010, ETH Zürich

Subjects/Keywords: CODIERUNG (INFORMATIONSTHEORIE); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); CRYPTOGRAPHY (INFORMATION THEORY); CODING (INFORMATION THEORY); KRYPTOGRAPHIE (INFORMATIONSTHEORIE); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/510; Data processing, computer science; Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tessaro, S. M. (2010). Computational Indistinguishability Amplification. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72847

Chicago Manual of Style (16th Edition):

Tessaro, Stefano M. “Computational Indistinguishability Amplification.” 2010. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/72847.

MLA Handbook (7th Edition):

Tessaro, Stefano M. “Computational Indistinguishability Amplification.” 2010. Web. 22 Jan 2020.

Vancouver:

Tessaro SM. Computational Indistinguishability Amplification. [Internet] [Doctoral dissertation]. ETH Zürich; 2010. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/72847.

Council of Science Editors:

Tessaro SM. Computational Indistinguishability Amplification. [Doctoral Dissertation]. ETH Zürich; 2010. Available from: http://hdl.handle.net/20.500.11850/72847


ETH Zürich

21. Bidder, Diana von. Specification-based Firewall Testing.

Degree: 2007, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); LAN, LOCAL AREA NETWORKS (COMPUTER SYSTEMS); LAN, LOCAL AREA NETWORKS (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bidder, D. v. (2007). Specification-based Firewall Testing. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72845

Chicago Manual of Style (16th Edition):

Bidder, Diana von. “Specification-based Firewall Testing.” 2007. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/72845.

MLA Handbook (7th Edition):

Bidder, Diana von. “Specification-based Firewall Testing.” 2007. Web. 22 Jan 2020.

Vancouver:

Bidder Dv. Specification-based Firewall Testing. [Internet] [Doctoral dissertation]. ETH Zürich; 2007. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/72845.

Council of Science Editors:

Bidder Dv. Specification-based Firewall Testing. [Doctoral Dissertation]. ETH Zürich; 2007. Available from: http://hdl.handle.net/20.500.11850/72845


ETH Zürich

22. Köpf, Boris Alexander. Formal approaches to countering side-channel attacks.

Degree: 2007, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); CRYPTOGRAPHY (INFORMATION THEORY); NETWORK MONITORING (COMPUTER SYSTEMS); KRYPTOGRAPHIE (INFORMATIONSTHEORIE); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Köpf, B. A. (2007). Formal approaches to countering side-channel attacks. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72790

Chicago Manual of Style (16th Edition):

Köpf, Boris Alexander. “Formal approaches to countering side-channel attacks.” 2007. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/72790.

MLA Handbook (7th Edition):

Köpf, Boris Alexander. “Formal approaches to countering side-channel attacks.” 2007. Web. 22 Jan 2020.

Vancouver:

Köpf BA. Formal approaches to countering side-channel attacks. [Internet] [Doctoral dissertation]. ETH Zürich; 2007. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/72790.

Council of Science Editors:

Köpf BA. Formal approaches to countering side-channel attacks. [Doctoral Dissertation]. ETH Zürich; 2007. Available from: http://hdl.handle.net/20.500.11850/72790


ETH Zürich

23. Sjödin, Ulf Johan. Weak pseudorandomness and unpredictability.

Degree: 2007, ETH Zürich

Subjects/Keywords: CODIERUNG (INFORMATIONSTHEORIE); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); CRYPTOGRAPHY (INFORMATION THEORY); CODING (INFORMATION THEORY); KRYPTOGRAPHIE (INFORMATIONSTHEORIE); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sjödin, U. J. (2007). Weak pseudorandomness and unpredictability. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72710

Chicago Manual of Style (16th Edition):

Sjödin, Ulf Johan. “Weak pseudorandomness and unpredictability.” 2007. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/72710.

MLA Handbook (7th Edition):

Sjödin, Ulf Johan. “Weak pseudorandomness and unpredictability.” 2007. Web. 22 Jan 2020.

Vancouver:

Sjödin UJ. Weak pseudorandomness and unpredictability. [Internet] [Doctoral dissertation]. ETH Zürich; 2007. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/72710.

Council of Science Editors:

Sjödin UJ. Weak pseudorandomness and unpredictability. [Doctoral Dissertation]. ETH Zürich; 2007. Available from: http://hdl.handle.net/20.500.11850/72710


ETH Zürich

24. Trammell-Keller, Ariane. Dynamic Protocol Stacks.

Degree: 2014, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); DATA COMMUNICATIONS (COMPUTER SYSTEMS); DATENKOMMUNIKATION (COMPUTERSYSTEME); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trammell-Keller, A. (2014). Dynamic Protocol Stacks. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/91061

Chicago Manual of Style (16th Edition):

Trammell-Keller, Ariane. “Dynamic Protocol Stacks.” 2014. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/91061.

MLA Handbook (7th Edition):

Trammell-Keller, Ariane. “Dynamic Protocol Stacks.” 2014. Web. 22 Jan 2020.

Vancouver:

Trammell-Keller A. Dynamic Protocol Stacks. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/91061.

Council of Science Editors:

Trammell-Keller A. Dynamic Protocol Stacks. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/91061


ETH Zürich

25. Lazzari, Marco. Systematic Testing of Tor.

Degree: 2014, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); TESTING + DEBUGGING (SOFTWARE ENGINEERING); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); TESTEN + FEHLERSUCHEN (SOFTWARE ENGINEERING); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lazzari, M. (2014). Systematic Testing of Tor. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/83212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lazzari, Marco. “Systematic Testing of Tor.” 2014. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/83212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lazzari, Marco. “Systematic Testing of Tor.” 2014. Web. 22 Jan 2020.

Vancouver:

Lazzari M. Systematic Testing of Tor. [Internet] [Thesis]. ETH Zürich; 2014. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/83212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lazzari M. Systematic Testing of Tor. [Thesis]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/83212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

26. Albrecht, Keno. Mastering Spam: A Multifaceted Approach with the Spamato Spam Filter System.

Degree: 2006, ETH Zürich

Subjects/Keywords: KOMMUNIKATIONSSOFTWARE (SOFTWAREPRODUKTE); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); COMMUNICATION SOFTWARE (SOFTWARE PRODUCTS); ELECTRONIC MAIL + MAILBOX (TELECOMMUNICATIONS); ELEKTRONISCHE POST + ELEKTRONISCHER BRIEFKASTEN (NACHRICHTENWESEN); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Albrecht, K. (2006). Mastering Spam: A Multifaceted Approach with the Spamato Spam Filter System. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/149712

Chicago Manual of Style (16th Edition):

Albrecht, Keno. “Mastering Spam: A Multifaceted Approach with the Spamato Spam Filter System.” 2006. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/149712.

MLA Handbook (7th Edition):

Albrecht, Keno. “Mastering Spam: A Multifaceted Approach with the Spamato Spam Filter System.” 2006. Web. 22 Jan 2020.

Vancouver:

Albrecht K. Mastering Spam: A Multifaceted Approach with the Spamato Spam Filter System. [Internet] [Doctoral dissertation]. ETH Zürich; 2006. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/149712.

Council of Science Editors:

Albrecht K. Mastering Spam: A Multifaceted Approach with the Spamato Spam Filter System. [Doctoral Dissertation]. ETH Zürich; 2006. Available from: http://hdl.handle.net/20.500.11850/149712


ETH Zürich

27. Caronni, Germano. Dynamic security in communication systems.

Degree: 1999, ETH Zürich

Subjects/Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); DATENKOMMUNIKATION (COMPUTERSYSTEME); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); DATA COMMUNICATIONS (COMPUTER SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Caronni, G. (1999). Dynamic security in communication systems. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/144356

Chicago Manual of Style (16th Edition):

Caronni, Germano. “Dynamic security in communication systems.” 1999. Doctoral Dissertation, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/144356.

MLA Handbook (7th Edition):

Caronni, Germano. “Dynamic security in communication systems.” 1999. Web. 22 Jan 2020.

Vancouver:

Caronni G. Dynamic security in communication systems. [Internet] [Doctoral dissertation]. ETH Zürich; 1999. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/144356.

Council of Science Editors:

Caronni G. Dynamic security in communication systems. [Doctoral Dissertation]. ETH Zürich; 1999. Available from: http://hdl.handle.net/20.500.11850/144356


ETH Zürich

28. Rüegg, Maurice. Virtual private network provisioning in the hose model.

Degree: 2003, ETH Zürich

Subjects/Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); LAN, LOCAL AREA NETWORKS (COMPUTERSYSTEME); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); LAN, LOCAL AREA NETWORKS (COMPUTER SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rüegg, M. (2003). Virtual private network provisioning in the hose model. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/147713

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rüegg, Maurice. “Virtual private network provisioning in the hose model.” 2003. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/147713.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rüegg, Maurice. “Virtual private network provisioning in the hose model.” 2003. Web. 22 Jan 2020.

Vancouver:

Rüegg M. Virtual private network provisioning in the hose model. [Internet] [Thesis]. ETH Zürich; 2003. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/147713.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rüegg M. Virtual private network provisioning in the hose model. [Thesis]. ETH Zürich; 2003. Available from: http://hdl.handle.net/20.500.11850/147713

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

29. Lucas, Christoph. Combining computational and information-theoretic security in multi-party computation.

Degree: 2008, ETH Zürich

Subjects/Keywords: NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lucas, C. (2008). Combining computational and information-theoretic security in multi-party computation. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lucas, Christoph. “Combining computational and information-theoretic security in multi-party computation.” 2008. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/150880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lucas, Christoph. “Combining computational and information-theoretic security in multi-party computation.” 2008. Web. 22 Jan 2020.

Vancouver:

Lucas C. Combining computational and information-theoretic security in multi-party computation. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/150880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lucas C. Combining computational and information-theoretic security in multi-party computation. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

30. Rabenseifner, Adrian. Oblivious transfer from non-local correlations.

Degree: 2009, ETH Zürich

Subjects/Keywords: CODIERUNG (INFORMATIONSTHEORIE); KRYPTOGRAPHIE (INFORMATIONSTHEORIE); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); CODING (INFORMATION THEORY); CRYPTOGRAPHY (INFORMATION THEORY); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/510; Data processing, computer science; Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rabenseifner, A. (2009). Oblivious transfer from non-local correlations. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/151044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rabenseifner, Adrian. “Oblivious transfer from non-local correlations.” 2009. Thesis, ETH Zürich. Accessed January 22, 2020. http://hdl.handle.net/20.500.11850/151044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rabenseifner, Adrian. “Oblivious transfer from non-local correlations.” 2009. Web. 22 Jan 2020.

Vancouver:

Rabenseifner A. Oblivious transfer from non-local correlations. [Internet] [Thesis]. ETH Zürich; 2009. [cited 2020 Jan 22]. Available from: http://hdl.handle.net/20.500.11850/151044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rabenseifner A. Oblivious transfer from non-local correlations. [Thesis]. ETH Zürich; 2009. Available from: http://hdl.handle.net/20.500.11850/151044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7] [8] [9]

.