Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Data encryption Computer science ). Showing records 1 – 30 of 201218 total matches.

[1] [2] [3] [4] [5] … [6708]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Oregon State University

1. Basa, Gungor. Image Based Crypto.

Degree: MS, Computer Science, 2016, Oregon State University

 The ability to create reproducible cryptographically secure keys from temporal environments (e.g., images) has the potential to be a contributor to effective cryptographic mechanisms. Due… (more)

Subjects/Keywords: Image; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basa, G. (2016). Image Based Crypto. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/60039

Chicago Manual of Style (16th Edition):

Basa, Gungor. “Image Based Crypto.” 2016. Masters Thesis, Oregon State University. Accessed April 05, 2020. http://hdl.handle.net/1957/60039.

MLA Handbook (7th Edition):

Basa, Gungor. “Image Based Crypto.” 2016. Web. 05 Apr 2020.

Vancouver:

Basa G. Image Based Crypto. [Internet] [Masters thesis]. Oregon State University; 2016. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/1957/60039.

Council of Science Editors:

Basa G. Image Based Crypto. [Masters Thesis]. Oregon State University; 2016. Available from: http://hdl.handle.net/1957/60039


Rutgers University

2. Durak, Fatma, 1985-. Cryptanalytic study of property-preserving encryption.

Degree: PhD, Computer Science, 2017, Rutgers University

 emph{Property-preserving encryption} (PPE) provides accessible methods to encrypt the databases in an efficient way by preserving specific fuctionalities of databases. PPE as an impactful research… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Durak, Fatma, 1. (2017). Cryptanalytic study of property-preserving encryption. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/55458/

Chicago Manual of Style (16th Edition):

Durak, Fatma, 1985-. “Cryptanalytic study of property-preserving encryption.” 2017. Doctoral Dissertation, Rutgers University. Accessed April 05, 2020. https://rucore.libraries.rutgers.edu/rutgers-lib/55458/.

MLA Handbook (7th Edition):

Durak, Fatma, 1985-. “Cryptanalytic study of property-preserving encryption.” 2017. Web. 05 Apr 2020.

Vancouver:

Durak, Fatma 1. Cryptanalytic study of property-preserving encryption. [Internet] [Doctoral dissertation]. Rutgers University; 2017. [cited 2020 Apr 05]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55458/.

Council of Science Editors:

Durak, Fatma 1. Cryptanalytic study of property-preserving encryption. [Doctoral Dissertation]. Rutgers University; 2017. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55458/


University of Johannesburg

3. Ellefsen, Ian David. A secure steganographic file system with non-duplicating properties.

Degree: 2012, University of Johannesburg

M.Sc.

This dissertation investigates the possibility of a steganographic file system which does not have to duplicate hidden data in order to avoid "collisions" between… (more)

Subjects/Keywords: Cryptography; Computer security; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ellefsen, I. D. (2012). A secure steganographic file system with non-duplicating properties. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7367

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ellefsen, Ian David. “A secure steganographic file system with non-duplicating properties.” 2012. Thesis, University of Johannesburg. Accessed April 05, 2020. http://hdl.handle.net/10210/7367.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ellefsen, Ian David. “A secure steganographic file system with non-duplicating properties.” 2012. Web. 05 Apr 2020.

Vancouver:

Ellefsen ID. A secure steganographic file system with non-duplicating properties. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10210/7367.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ellefsen ID. A secure steganographic file system with non-duplicating properties. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7367

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

4. Cheng, Min Hsuan. A new Modulo Addition with enhanced scalable security against algebraic attack.

Degree: 2016, Ryerson University

 In recent years, Algebraic Attack has emerged to be an important cryptanalysis method in evaluating encryption algorithms. The attack exploits algebraic equations between the inputs… (more)

Subjects/Keywords: Computer algorithms.; Data encryption (Computer science); Cryptography.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, M. H. (2016). A new Modulo Addition with enhanced scalable security against algebraic attack. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A4892

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Min Hsuan. “A new Modulo Addition with enhanced scalable security against algebraic attack.” 2016. Thesis, Ryerson University. Accessed April 05, 2020. https://digital.library.ryerson.ca/islandora/object/RULA%3A4892.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Min Hsuan. “A new Modulo Addition with enhanced scalable security against algebraic attack.” 2016. Web. 05 Apr 2020.

Vancouver:

Cheng MH. A new Modulo Addition with enhanced scalable security against algebraic attack. [Internet] [Thesis]. Ryerson University; 2016. [cited 2020 Apr 05]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A4892.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng MH. A new Modulo Addition with enhanced scalable security against algebraic attack. [Thesis]. Ryerson University; 2016. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A4892

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

5. Hu, Zhangxiang. Random access machine in secure multi-party computation.

Degree: MS, Computer Science, 2015, Oregon State University

 Secure multi-party computation (MPC) is a conceptual framework in cryptography. It allows distrusting parties engage in a protocol to perform a computational task while still… (more)

Subjects/Keywords: Secure computation; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, Z. (2015). Random access machine in secure multi-party computation. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/56359

Chicago Manual of Style (16th Edition):

Hu, Zhangxiang. “Random access machine in secure multi-party computation.” 2015. Masters Thesis, Oregon State University. Accessed April 05, 2020. http://hdl.handle.net/1957/56359.

MLA Handbook (7th Edition):

Hu, Zhangxiang. “Random access machine in secure multi-party computation.” 2015. Web. 05 Apr 2020.

Vancouver:

Hu Z. Random access machine in secure multi-party computation. [Internet] [Masters thesis]. Oregon State University; 2015. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/1957/56359.

Council of Science Editors:

Hu Z. Random access machine in secure multi-party computation. [Masters Thesis]. Oregon State University; 2015. Available from: http://hdl.handle.net/1957/56359


University of Victoria

6. Hajiabadi, Mohammad. Encryption security against key-dependent-message attacks: applications, realizations and separations.

Degree: Department of Computer Science, 2016, University of Victoria

 In this thesis we study the notion of circular security for bit-encryption schemes. Informally speaking, a bit-encryption scheme is circular secure if it remains secure… (more)

Subjects/Keywords: Data encryption (Computer science); Public key cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hajiabadi, M. (2016). Encryption security against key-dependent-message attacks: applications, realizations and separations. (Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/7454

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hajiabadi, Mohammad. “Encryption security against key-dependent-message attacks: applications, realizations and separations.” 2016. Thesis, University of Victoria. Accessed April 05, 2020. http://hdl.handle.net/1828/7454.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hajiabadi, Mohammad. “Encryption security against key-dependent-message attacks: applications, realizations and separations.” 2016. Web. 05 Apr 2020.

Vancouver:

Hajiabadi M. Encryption security against key-dependent-message attacks: applications, realizations and separations. [Internet] [Thesis]. University of Victoria; 2016. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/1828/7454.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hajiabadi M. Encryption security against key-dependent-message attacks: applications, realizations and separations. [Thesis]. University of Victoria; 2016. Available from: http://hdl.handle.net/1828/7454

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Stellenbosch University

7. Coetzee, Dirk Badenhorst. The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios.

Degree: MScEng, Electrical and Electronic Engineering, 2013, Stellenbosch University

ENGLISH ABSTRACT: A secure product entitlement system allows one party, such as a pay-TV operator, to broadcast the same collection of information to several receiving… (more)

Subjects/Keywords: Electronic engineering; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coetzee, D. B. (2013). The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios. (Masters Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/80292

Chicago Manual of Style (16th Edition):

Coetzee, Dirk Badenhorst. “The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios.” 2013. Masters Thesis, Stellenbosch University. Accessed April 05, 2020. http://hdl.handle.net/10019.1/80292.

MLA Handbook (7th Edition):

Coetzee, Dirk Badenhorst. “The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios.” 2013. Web. 05 Apr 2020.

Vancouver:

Coetzee DB. The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios. [Internet] [Masters thesis]. Stellenbosch University; 2013. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10019.1/80292.

Council of Science Editors:

Coetzee DB. The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios. [Masters Thesis]. Stellenbosch University; 2013. Available from: http://hdl.handle.net/10019.1/80292


Columbia University

8. Krell Loy, Fernando. Secure Computation Towards Practical Applications.

Degree: 2016, Columbia University

 Secure multi-party computation (MPC) is a central area of research in cryptography. Its goal is to allow a set of players to jointly compute a… (more)

Subjects/Keywords: Computer security; Data encryption (Computer science); Computer science; Cryptography; Information technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krell Loy, F. (2016). Secure Computation Towards Practical Applications. (Doctoral Dissertation). Columbia University. Retrieved from https://doi.org/10.7916/D8JD4WQT

Chicago Manual of Style (16th Edition):

Krell Loy, Fernando. “Secure Computation Towards Practical Applications.” 2016. Doctoral Dissertation, Columbia University. Accessed April 05, 2020. https://doi.org/10.7916/D8JD4WQT.

MLA Handbook (7th Edition):

Krell Loy, Fernando. “Secure Computation Towards Practical Applications.” 2016. Web. 05 Apr 2020.

Vancouver:

Krell Loy F. Secure Computation Towards Practical Applications. [Internet] [Doctoral dissertation]. Columbia University; 2016. [cited 2020 Apr 05]. Available from: https://doi.org/10.7916/D8JD4WQT.

Council of Science Editors:

Krell Loy F. Secure Computation Towards Practical Applications. [Doctoral Dissertation]. Columbia University; 2016. Available from: https://doi.org/10.7916/D8JD4WQT


Portland State University

9. Griffy, Scott Sherlock. Crumpled and Abraded Encryption: Implementation and Provably Secure Construction.

Degree: MS(M.S.) in Computer Science, Computer Science, 2019, Portland State University

  Abraded and crumpled encryption allows communication software such as messaging platforms to ensure privacy for their users while still allowing for some investigation by… (more)

Subjects/Keywords: Computer science; Data encryption (Computer science); Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Griffy, S. S. (2019). Crumpled and Abraded Encryption: Implementation and Provably Secure Construction. (Masters Thesis). Portland State University. Retrieved from https://pdxscholar.library.pdx.edu/open_access_etds/5067

Chicago Manual of Style (16th Edition):

Griffy, Scott Sherlock. “Crumpled and Abraded Encryption: Implementation and Provably Secure Construction.” 2019. Masters Thesis, Portland State University. Accessed April 05, 2020. https://pdxscholar.library.pdx.edu/open_access_etds/5067.

MLA Handbook (7th Edition):

Griffy, Scott Sherlock. “Crumpled and Abraded Encryption: Implementation and Provably Secure Construction.” 2019. Web. 05 Apr 2020.

Vancouver:

Griffy SS. Crumpled and Abraded Encryption: Implementation and Provably Secure Construction. [Internet] [Masters thesis]. Portland State University; 2019. [cited 2020 Apr 05]. Available from: https://pdxscholar.library.pdx.edu/open_access_etds/5067.

Council of Science Editors:

Griffy SS. Crumpled and Abraded Encryption: Implementation and Provably Secure Construction. [Masters Thesis]. Portland State University; 2019. Available from: https://pdxscholar.library.pdx.edu/open_access_etds/5067


Hong Kong University of Science and Technology

10. Zhen, Yi. Some research issues in hash function learning.

Degree: 2012, Hong Kong University of Science and Technology

 Over the past decade, hashing-based methods for large-scale similarity search have sparked considerable research interest in the database, data mining and information retrieval communities. These… (more)

Subjects/Keywords: Hashing (Computer science) ; Data encryption (Computer science) ; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhen, Y. (2012). Some research issues in hash function learning. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-73397 ; https://doi.org/10.14711/thesis-b1198629 ; http://repository.ust.hk/ir/bitstream/1783.1-73397/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhen, Yi. “Some research issues in hash function learning.” 2012. Thesis, Hong Kong University of Science and Technology. Accessed April 05, 2020. http://repository.ust.hk/ir/Record/1783.1-73397 ; https://doi.org/10.14711/thesis-b1198629 ; http://repository.ust.hk/ir/bitstream/1783.1-73397/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhen, Yi. “Some research issues in hash function learning.” 2012. Web. 05 Apr 2020.

Vancouver:

Zhen Y. Some research issues in hash function learning. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2012. [cited 2020 Apr 05]. Available from: http://repository.ust.hk/ir/Record/1783.1-73397 ; https://doi.org/10.14711/thesis-b1198629 ; http://repository.ust.hk/ir/bitstream/1783.1-73397/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhen Y. Some research issues in hash function learning. [Thesis]. Hong Kong University of Science and Technology; 2012. Available from: http://repository.ust.hk/ir/Record/1783.1-73397 ; https://doi.org/10.14711/thesis-b1198629 ; http://repository.ust.hk/ir/bitstream/1783.1-73397/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

11. Okere, Irene Onyekachi. A control framework for the assessment of information security culture.

Degree: MTech, Faculty of Business and Economic Sciences, 2013, Nelson Mandela Metropolitan University

 The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal… (more)

Subjects/Keywords: Data encryption (Computer science); Business  – Data processing  – Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Okere, I. O. (2013). A control framework for the assessment of information security culture. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1019861

Chicago Manual of Style (16th Edition):

Okere, Irene Onyekachi. “A control framework for the assessment of information security culture.” 2013. Masters Thesis, Nelson Mandela Metropolitan University. Accessed April 05, 2020. http://hdl.handle.net/10948/d1019861.

MLA Handbook (7th Edition):

Okere, Irene Onyekachi. “A control framework for the assessment of information security culture.” 2013. Web. 05 Apr 2020.

Vancouver:

Okere IO. A control framework for the assessment of information security culture. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10948/d1019861.

Council of Science Editors:

Okere IO. A control framework for the assessment of information security culture. [Masters Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1019861


Rochester Institute of Technology

12. Martin, Russell F. Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption.

Degree: MS, Computer Engineering, 2013, Rochester Institute of Technology

  Ciphertext-Policy Attribute-Based Encryption (CPABE) was introduced by Bethencourt, Sahai, and Waters, as an improvement of Identity Based Encryption, allowing fine grained control of access… (more)

Subjects/Keywords: Attitude based encryption; Cryptography; Public key infrastructure (Computer security); Data encryption (Computer science); Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martin, R. F. (2013). Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/967

Chicago Manual of Style (16th Edition):

Martin, Russell F. “Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption.” 2013. Masters Thesis, Rochester Institute of Technology. Accessed April 05, 2020. https://scholarworks.rit.edu/theses/967.

MLA Handbook (7th Edition):

Martin, Russell F. “Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption.” 2013. Web. 05 Apr 2020.

Vancouver:

Martin RF. Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption. [Internet] [Masters thesis]. Rochester Institute of Technology; 2013. [cited 2020 Apr 05]. Available from: https://scholarworks.rit.edu/theses/967.

Council of Science Editors:

Martin RF. Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption. [Masters Thesis]. Rochester Institute of Technology; 2013. Available from: https://scholarworks.rit.edu/theses/967


Drexel University

13. Shortell, Thomas M. Secure Signal Processing and Secure Machine Learning using Fully Homomorphic Encryption.

Degree: 2018, Drexel University

This dissertation focuses on the new techniques for secure and private computation for signal processing and machine learning. Specifically, the thesis will focuses on extending… (more)

Subjects/Keywords: Computer science; Data encryption (Computer science); Machine learning; Signal processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shortell, T. M. (2018). Secure Signal Processing and Secure Machine Learning using Fully Homomorphic Encryption. (Thesis). Drexel University. Retrieved from https://idea.library.drexel.edu/islandora/object/idea%3A8191

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shortell, Thomas M. “Secure Signal Processing and Secure Machine Learning using Fully Homomorphic Encryption.” 2018. Thesis, Drexel University. Accessed April 05, 2020. https://idea.library.drexel.edu/islandora/object/idea%3A8191.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shortell, Thomas M. “Secure Signal Processing and Secure Machine Learning using Fully Homomorphic Encryption.” 2018. Web. 05 Apr 2020.

Vancouver:

Shortell TM. Secure Signal Processing and Secure Machine Learning using Fully Homomorphic Encryption. [Internet] [Thesis]. Drexel University; 2018. [cited 2020 Apr 05]. Available from: https://idea.library.drexel.edu/islandora/object/idea%3A8191.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shortell TM. Secure Signal Processing and Secure Machine Learning using Fully Homomorphic Encryption. [Thesis]. Drexel University; 2018. Available from: https://idea.library.drexel.edu/islandora/object/idea%3A8191

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Columbia University

14. Kowalczyk, Lucas. Attribute-Based Encryption for Boolean Formulas.

Degree: 2019, Columbia University

 We present attribute-based encryption (ABE) schemes for Boolean formulas that are adaptively secure under simple assumptions. Notably, our KP-ABE scheme enjoys a ciphertext size that… (more)

Subjects/Keywords: Computer science; Data encryption (Computer science); Algebra, Boolean

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kowalczyk, L. (2019). Attribute-Based Encryption for Boolean Formulas. (Doctoral Dissertation). Columbia University. Retrieved from https://doi.org/10.7916/d8-212y-yy33

Chicago Manual of Style (16th Edition):

Kowalczyk, Lucas. “Attribute-Based Encryption for Boolean Formulas.” 2019. Doctoral Dissertation, Columbia University. Accessed April 05, 2020. https://doi.org/10.7916/d8-212y-yy33.

MLA Handbook (7th Edition):

Kowalczyk, Lucas. “Attribute-Based Encryption for Boolean Formulas.” 2019. Web. 05 Apr 2020.

Vancouver:

Kowalczyk L. Attribute-Based Encryption for Boolean Formulas. [Internet] [Doctoral dissertation]. Columbia University; 2019. [cited 2020 Apr 05]. Available from: https://doi.org/10.7916/d8-212y-yy33.

Council of Science Editors:

Kowalczyk L. Attribute-Based Encryption for Boolean Formulas. [Doctoral Dissertation]. Columbia University; 2019. Available from: https://doi.org/10.7916/d8-212y-yy33


Columbia University

15. Sivakorn, Suphannee. Understanding Flaws in the Deployment and Implementation of Web Encryption.

Degree: 2018, Columbia University

 In recent years, the web has switched from using the unencrypted HTTP protocol to using encrypted communications. Primarily, this resulted in increasing deployment of TLS… (more)

Subjects/Keywords: Computer science; Data encryption (Computer science); Web servers; Internet – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sivakorn, S. (2018). Understanding Flaws in the Deployment and Implementation of Web Encryption. (Doctoral Dissertation). Columbia University. Retrieved from https://doi.org/10.7916/D8001JJ6

Chicago Manual of Style (16th Edition):

Sivakorn, Suphannee. “Understanding Flaws in the Deployment and Implementation of Web Encryption.” 2018. Doctoral Dissertation, Columbia University. Accessed April 05, 2020. https://doi.org/10.7916/D8001JJ6.

MLA Handbook (7th Edition):

Sivakorn, Suphannee. “Understanding Flaws in the Deployment and Implementation of Web Encryption.” 2018. Web. 05 Apr 2020.

Vancouver:

Sivakorn S. Understanding Flaws in the Deployment and Implementation of Web Encryption. [Internet] [Doctoral dissertation]. Columbia University; 2018. [cited 2020 Apr 05]. Available from: https://doi.org/10.7916/D8001JJ6.

Council of Science Editors:

Sivakorn S. Understanding Flaws in the Deployment and Implementation of Web Encryption. [Doctoral Dissertation]. Columbia University; 2018. Available from: https://doi.org/10.7916/D8001JJ6


Hong Kong University of Science and Technology

16. Wong, Kwok Wai. Efficient range query on encrypted database without additional information leakage.

Degree: 2016, Hong Kong University of Science and Technology

 Numerous encrypted database management systems (EDBMSs) were recently developed to address data confidentiality in case the database server is compromised. Data is encrypted before it… (more)

Subjects/Keywords: Data encryption (Computer science) ; Database management ; Access control ; Querying (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong, K. W. (2016). Efficient range query on encrypted database without additional information leakage. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-87959 ; https://doi.org/10.14711/thesis-b1778936 ; http://repository.ust.hk/ir/bitstream/1783.1-87959/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wong, Kwok Wai. “Efficient range query on encrypted database without additional information leakage.” 2016. Thesis, Hong Kong University of Science and Technology. Accessed April 05, 2020. http://repository.ust.hk/ir/Record/1783.1-87959 ; https://doi.org/10.14711/thesis-b1778936 ; http://repository.ust.hk/ir/bitstream/1783.1-87959/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wong, Kwok Wai. “Efficient range query on encrypted database without additional information leakage.” 2016. Web. 05 Apr 2020.

Vancouver:

Wong KW. Efficient range query on encrypted database without additional information leakage. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2016. [cited 2020 Apr 05]. Available from: http://repository.ust.hk/ir/Record/1783.1-87959 ; https://doi.org/10.14711/thesis-b1778936 ; http://repository.ust.hk/ir/bitstream/1783.1-87959/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wong KW. Efficient range query on encrypted database without additional information leakage. [Thesis]. Hong Kong University of Science and Technology; 2016. Available from: http://repository.ust.hk/ir/Record/1783.1-87959 ; https://doi.org/10.14711/thesis-b1778936 ; http://repository.ust.hk/ir/bitstream/1783.1-87959/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nanyang Technological University

17. Fawad, Ahmed. Encryption, authentication and copyright protection techniques for digital images .

Degree: 2010, Nanyang Technological University

 For the past several years, a lot of research work has been underway to devise security techniques to protect multimedia data like audio, image and… (more)

Subjects/Keywords: DRNTU::Engineering::Computer science and engineering::Data::Data encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fawad, A. (2010). Encryption, authentication and copyright protection techniques for digital images . (Thesis). Nanyang Technological University. Retrieved from http://hdl.handle.net/10356/46246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fawad, Ahmed. “Encryption, authentication and copyright protection techniques for digital images .” 2010. Thesis, Nanyang Technological University. Accessed April 05, 2020. http://hdl.handle.net/10356/46246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fawad, Ahmed. “Encryption, authentication and copyright protection techniques for digital images .” 2010. Web. 05 Apr 2020.

Vancouver:

Fawad A. Encryption, authentication and copyright protection techniques for digital images . [Internet] [Thesis]. Nanyang Technological University; 2010. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10356/46246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fawad A. Encryption, authentication and copyright protection techniques for digital images . [Thesis]. Nanyang Technological University; 2010. Available from: http://hdl.handle.net/10356/46246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nanyang Technological University

18. Su, Le. Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation .

Degree: 2015, Nanyang Technological University

 Over the past decade, the emerging of pairing-based cryptography has attracted not only the attention from academic circle, but also industrial organizations. Starting from key… (more)

Subjects/Keywords: DRNTU::Engineering::Computer science and engineering::Data::Data encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Su, L. (2015). Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation . (Thesis). Nanyang Technological University. Retrieved from http://hdl.handle.net/10356/65244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Su, Le. “Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation .” 2015. Thesis, Nanyang Technological University. Accessed April 05, 2020. http://hdl.handle.net/10356/65244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Su, Le. “Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation .” 2015. Web. 05 Apr 2020.

Vancouver:

Su L. Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation . [Internet] [Thesis]. Nanyang Technological University; 2015. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10356/65244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Su L. Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation . [Thesis]. Nanyang Technological University; 2015. Available from: http://hdl.handle.net/10356/65244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nanyang Technological University

19. Jap, Dirmanto. Physical attacks on block ciphers .

Degree: 2016, Nanyang Technological University

 The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of… (more)

Subjects/Keywords: DRNTU::Engineering::Computer science and engineering::Data::Data encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jap, D. (2016). Physical attacks on block ciphers . (Thesis). Nanyang Technological University. Retrieved from http://hdl.handle.net/10356/69409

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jap, Dirmanto. “Physical attacks on block ciphers .” 2016. Thesis, Nanyang Technological University. Accessed April 05, 2020. http://hdl.handle.net/10356/69409.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jap, Dirmanto. “Physical attacks on block ciphers .” 2016. Web. 05 Apr 2020.

Vancouver:

Jap D. Physical attacks on block ciphers . [Internet] [Thesis]. Nanyang Technological University; 2016. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10356/69409.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jap D. Physical attacks on block ciphers . [Thesis]. Nanyang Technological University; 2016. Available from: http://hdl.handle.net/10356/69409

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

20. Chui, Sung Him. On encrypted-domain signal processing.

Degree: 2013, Hong Kong University of Science and Technology

 In this big data era, often a person (say Bob) needs another person (say Alice) to perform processing on his data. But both Alice and… (more)

Subjects/Keywords: Signal processing ; Data processing ; Cryptography ; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chui, S. H. (2013). On encrypted-domain signal processing. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-62302 ; https://doi.org/10.14711/thesis-b1251097 ; http://repository.ust.hk/ir/bitstream/1783.1-62302/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chui, Sung Him. “On encrypted-domain signal processing.” 2013. Thesis, Hong Kong University of Science and Technology. Accessed April 05, 2020. http://repository.ust.hk/ir/Record/1783.1-62302 ; https://doi.org/10.14711/thesis-b1251097 ; http://repository.ust.hk/ir/bitstream/1783.1-62302/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chui, Sung Him. “On encrypted-domain signal processing.” 2013. Web. 05 Apr 2020.

Vancouver:

Chui SH. On encrypted-domain signal processing. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2013. [cited 2020 Apr 05]. Available from: http://repository.ust.hk/ir/Record/1783.1-62302 ; https://doi.org/10.14711/thesis-b1251097 ; http://repository.ust.hk/ir/bitstream/1783.1-62302/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chui SH. On encrypted-domain signal processing. [Thesis]. Hong Kong University of Science and Technology; 2013. Available from: http://repository.ust.hk/ir/Record/1783.1-62302 ; https://doi.org/10.14711/thesis-b1251097 ; http://repository.ust.hk/ir/bitstream/1783.1-62302/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

21. Si, Wenpei. Additive synchronous stream ciphers.

Degree: 2012, Hong Kong University of Science and Technology

 Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ciphers are preferred in many applications, since they can destroy… (more)

Subjects/Keywords: Stream ciphers ; Data encryption (Computer science) ; Synchronous data transmission systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Si, W. (2012). Additive synchronous stream ciphers. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-7572 ; https://doi.org/10.14711/thesis-b1180147 ; http://repository.ust.hk/ir/bitstream/1783.1-7572/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Si, Wenpei. “Additive synchronous stream ciphers.” 2012. Thesis, Hong Kong University of Science and Technology. Accessed April 05, 2020. http://repository.ust.hk/ir/Record/1783.1-7572 ; https://doi.org/10.14711/thesis-b1180147 ; http://repository.ust.hk/ir/bitstream/1783.1-7572/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Si, Wenpei. “Additive synchronous stream ciphers.” 2012. Web. 05 Apr 2020.

Vancouver:

Si W. Additive synchronous stream ciphers. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2012. [cited 2020 Apr 05]. Available from: http://repository.ust.hk/ir/Record/1783.1-7572 ; https://doi.org/10.14711/thesis-b1180147 ; http://repository.ust.hk/ir/bitstream/1783.1-7572/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Si W. Additive synchronous stream ciphers. [Thesis]. Hong Kong University of Science and Technology; 2012. Available from: http://repository.ust.hk/ir/Record/1783.1-7572 ; https://doi.org/10.14711/thesis-b1180147 ; http://repository.ust.hk/ir/bitstream/1783.1-7572/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

22. 郭漢文.; Kwok, Hon-man, Sammy. A scalable and secure networking paradigm using identity-based cryptography.

Degree: PhD, 2011, University of Hong Kong

published_or_final_version

Electrical and Electronic Engineering

Doctoral

Doctor of Philosophy

Advisors/Committee Members: Lam, EYM, So, HKH.

Subjects/Keywords: Public key cryptography.; Computer networks - Security measures.; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

郭漢文.; Kwok, Hon-man, S. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Doctoral Dissertation). University of Hong Kong. Retrieved from Kwok, H. S. [郭漢文]. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4697171 ; http://dx.doi.org/10.5353/th_b4697171 ; http://hdl.handle.net/10722/144779

Chicago Manual of Style (16th Edition):

郭漢文.; Kwok, Hon-man, Sammy. “A scalable and secure networking paradigm using identity-based cryptography.” 2011. Doctoral Dissertation, University of Hong Kong. Accessed April 05, 2020. Kwok, H. S. [郭漢文]. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4697171 ; http://dx.doi.org/10.5353/th_b4697171 ; http://hdl.handle.net/10722/144779.

MLA Handbook (7th Edition):

郭漢文.; Kwok, Hon-man, Sammy. “A scalable and secure networking paradigm using identity-based cryptography.” 2011. Web. 05 Apr 2020.

Vancouver:

郭漢文.; Kwok, Hon-man S. A scalable and secure networking paradigm using identity-based cryptography. [Internet] [Doctoral dissertation]. University of Hong Kong; 2011. [cited 2020 Apr 05]. Available from: Kwok, H. S. [郭漢文]. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4697171 ; http://dx.doi.org/10.5353/th_b4697171 ; http://hdl.handle.net/10722/144779.

Council of Science Editors:

郭漢文.; Kwok, Hon-man S. A scalable and secure networking paradigm using identity-based cryptography. [Doctoral Dissertation]. University of Hong Kong; 2011. Available from: Kwok, H. S. [郭漢文]. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4697171 ; http://dx.doi.org/10.5353/th_b4697171 ; http://hdl.handle.net/10722/144779


University of KwaZulu-Natal

23. [No author]. An improved randomization of a multi-blocking jpeg based steganographic system.

Degree: Electronic engineering, 2010, University of KwaZulu-Natal

 Steganography is classified as the art of hiding information. In a digital context, this refers to our ability to hide secret messages within innocent digital… (more)

Subjects/Keywords: Embedded computer systems.; Data encryption (Computer science); Electronic engineering.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2010). An improved randomization of a multi-blocking jpeg based steganographic system. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/6919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “An improved randomization of a multi-blocking jpeg based steganographic system. ” 2010. Thesis, University of KwaZulu-Natal. Accessed April 05, 2020. http://hdl.handle.net/10413/6919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “An improved randomization of a multi-blocking jpeg based steganographic system. ” 2010. Web. 05 Apr 2020.

Vancouver:

author] [. An improved randomization of a multi-blocking jpeg based steganographic system. [Internet] [Thesis]. University of KwaZulu-Natal; 2010. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/10413/6919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. An improved randomization of a multi-blocking jpeg based steganographic system. [Thesis]. University of KwaZulu-Natal; 2010. Available from: http://hdl.handle.net/10413/6919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

24. Iftikhar, Shafaq. Cryptographic hash functions for image processing.

Degree: 2015, Ryerson University

 In this paper, a novel algorithm based on hash function for image cryptography is proposed. In this algorithm, the key idea is to encrypt half… (more)

Subjects/Keywords: Hashing (Computer science); Cryptography; Data encryption (Computer science); Computer algorithms; Image processing; Image analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Iftikhar, S. (2015). Cryptographic hash functions for image processing. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A3701

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Iftikhar, Shafaq. “Cryptographic hash functions for image processing.” 2015. Thesis, Ryerson University. Accessed April 05, 2020. https://digital.library.ryerson.ca/islandora/object/RULA%3A3701.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Iftikhar, Shafaq. “Cryptographic hash functions for image processing.” 2015. Web. 05 Apr 2020.

Vancouver:

Iftikhar S. Cryptographic hash functions for image processing. [Internet] [Thesis]. Ryerson University; 2015. [cited 2020 Apr 05]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3701.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Iftikhar S. Cryptographic hash functions for image processing. [Thesis]. Ryerson University; 2015. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3701

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

25. Erdem, Özkan M. Efficient key management protocols for mobile ad hoc networks.

Degree: PhD, Electrical and Computer Engineering, 2005, Oregon State University

 In this thesis, novel solutions are proposed for key management issues in mobile ad hoc networks. Presented Hierarchical Binary Tree (HBT) based model is distributed,… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Erdem, . M. (2005). Efficient key management protocols for mobile ad hoc networks. (Doctoral Dissertation). Oregon State University. Retrieved from http://hdl.handle.net/1957/29325

Chicago Manual of Style (16th Edition):

Erdem, Özkan M. “Efficient key management protocols for mobile ad hoc networks.” 2005. Doctoral Dissertation, Oregon State University. Accessed April 05, 2020. http://hdl.handle.net/1957/29325.

MLA Handbook (7th Edition):

Erdem, Özkan M. “Efficient key management protocols for mobile ad hoc networks.” 2005. Web. 05 Apr 2020.

Vancouver:

Erdem M. Efficient key management protocols for mobile ad hoc networks. [Internet] [Doctoral dissertation]. Oregon State University; 2005. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/1957/29325.

Council of Science Editors:

Erdem M. Efficient key management protocols for mobile ad hoc networks. [Doctoral Dissertation]. Oregon State University; 2005. Available from: http://hdl.handle.net/1957/29325


Oregon State University

26. Godbole, Pankaj. Optimizing the advanced encryption standard on Intel's SIMD architecture.

Degree: MS, Electrical and Computer Engineering, 2004, Oregon State University

 The Advanced Encryption Standard (AES) is the new standard for cryptography and has gained wide support as a means to secure digital data. Hence, it… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Godbole, P. (2004). Optimizing the advanced encryption standard on Intel's SIMD architecture. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/28870

Chicago Manual of Style (16th Edition):

Godbole, Pankaj. “Optimizing the advanced encryption standard on Intel's SIMD architecture.” 2004. Masters Thesis, Oregon State University. Accessed April 05, 2020. http://hdl.handle.net/1957/28870.

MLA Handbook (7th Edition):

Godbole, Pankaj. “Optimizing the advanced encryption standard on Intel's SIMD architecture.” 2004. Web. 05 Apr 2020.

Vancouver:

Godbole P. Optimizing the advanced encryption standard on Intel's SIMD architecture. [Internet] [Masters thesis]. Oregon State University; 2004. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/1957/28870.

Council of Science Editors:

Godbole P. Optimizing the advanced encryption standard on Intel's SIMD architecture. [Masters Thesis]. Oregon State University; 2004. Available from: http://hdl.handle.net/1957/28870


Oregon State University

27. Al Faresi, Ahmed. Hardware realization of OCB mode for efficient authenticated encryption.

Degree: MS, Electrical and Computer Engineering, 2005, Oregon State University

 Authenticated-Encryption modes of operation have recently received great atten- tion amongst researchers. Such modes of operation provide both privacy and authentic- ity. A proposed mode… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Faresi, A. (2005). Hardware realization of OCB mode for efficient authenticated encryption. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/11543

Chicago Manual of Style (16th Edition):

Al Faresi, Ahmed. “Hardware realization of OCB mode for efficient authenticated encryption.” 2005. Masters Thesis, Oregon State University. Accessed April 05, 2020. http://hdl.handle.net/1957/11543.

MLA Handbook (7th Edition):

Al Faresi, Ahmed. “Hardware realization of OCB mode for efficient authenticated encryption.” 2005. Web. 05 Apr 2020.

Vancouver:

Al Faresi A. Hardware realization of OCB mode for efficient authenticated encryption. [Internet] [Masters thesis]. Oregon State University; 2005. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/1957/11543.

Council of Science Editors:

Al Faresi A. Hardware realization of OCB mode for efficient authenticated encryption. [Masters Thesis]. Oregon State University; 2005. Available from: http://hdl.handle.net/1957/11543


Oregon State University

28. Yang, Wen-Chun. Hardware realization for Advanced Encryption Standard key generation.

Degree: MS, Electrical and Computer Engineering, 2005, Oregon State University

 Advanced Encryption Standard (AES) is one of the secret key algorithms used in Cryptography. It is applied in a variety of applications including smart cards,… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, W. (2005). Hardware realization for Advanced Encryption Standard key generation. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/10310

Chicago Manual of Style (16th Edition):

Yang, Wen-Chun. “Hardware realization for Advanced Encryption Standard key generation.” 2005. Masters Thesis, Oregon State University. Accessed April 05, 2020. http://hdl.handle.net/1957/10310.

MLA Handbook (7th Edition):

Yang, Wen-Chun. “Hardware realization for Advanced Encryption Standard key generation.” 2005. Web. 05 Apr 2020.

Vancouver:

Yang W. Hardware realization for Advanced Encryption Standard key generation. [Internet] [Masters thesis]. Oregon State University; 2005. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/1957/10310.

Council of Science Editors:

Yang W. Hardware realization for Advanced Encryption Standard key generation. [Masters Thesis]. Oregon State University; 2005. Available from: http://hdl.handle.net/1957/10310


Oregon State University

29. Shamsuddin, Rayees. A comparative study of AES implementations on ARM processors.

Degree: MS, Electrical and Computer Engineering, 2005, Oregon State University

 AES (Advanced Encryption Standard), also known as Rijndael, is a symmetric key block cipher adopted as an encryption standard by the US government and used… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shamsuddin, R. (2005). A comparative study of AES implementations on ARM processors. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/10307

Chicago Manual of Style (16th Edition):

Shamsuddin, Rayees. “A comparative study of AES implementations on ARM processors.” 2005. Masters Thesis, Oregon State University. Accessed April 05, 2020. http://hdl.handle.net/1957/10307.

MLA Handbook (7th Edition):

Shamsuddin, Rayees. “A comparative study of AES implementations on ARM processors.” 2005. Web. 05 Apr 2020.

Vancouver:

Shamsuddin R. A comparative study of AES implementations on ARM processors. [Internet] [Masters thesis]. Oregon State University; 2005. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/1957/10307.

Council of Science Editors:

Shamsuddin R. A comparative study of AES implementations on ARM processors. [Masters Thesis]. Oregon State University; 2005. Available from: http://hdl.handle.net/1957/10307


Oregon State University

30. Banerjee, Uday. Hardware encryption using the MPC180 security co-processor.

Degree: MS, Electrical and Computer Engineering, 2003, Oregon State University

 Hardware cryptography offers a reliable way to provide security for data that is sent over networks. Security processors have taken the stage in the movement… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Banerjee, U. (2003). Hardware encryption using the MPC180 security co-processor. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/10465

Chicago Manual of Style (16th Edition):

Banerjee, Uday. “Hardware encryption using the MPC180 security co-processor.” 2003. Masters Thesis, Oregon State University. Accessed April 05, 2020. http://hdl.handle.net/1957/10465.

MLA Handbook (7th Edition):

Banerjee, Uday. “Hardware encryption using the MPC180 security co-processor.” 2003. Web. 05 Apr 2020.

Vancouver:

Banerjee U. Hardware encryption using the MPC180 security co-processor. [Internet] [Masters thesis]. Oregon State University; 2003. [cited 2020 Apr 05]. Available from: http://hdl.handle.net/1957/10465.

Council of Science Editors:

Banerjee U. Hardware encryption using the MPC180 security co-processor. [Masters Thesis]. Oregon State University; 2003. Available from: http://hdl.handle.net/1957/10465

[1] [2] [3] [4] [5] … [6708]

.