Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Data encryption). Showing records 1 – 30 of 323 total matches.

[1] [2] [3] [4] [5] … [11]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Oregon State University

1. Basa, Gungor. Image Based Crypto.

Degree: MS, Computer Science, 2016, Oregon State University

 The ability to create reproducible cryptographically secure keys from temporal environments (e.g., images) has the potential to be a contributor to effective cryptographic mechanisms. Due… (more)

Subjects/Keywords: Image; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basa, G. (2016). Image Based Crypto. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/60039

Chicago Manual of Style (16th Edition):

Basa, Gungor. “Image Based Crypto.” 2016. Masters Thesis, Oregon State University. Accessed May 06, 2021. http://hdl.handle.net/1957/60039.

MLA Handbook (7th Edition):

Basa, Gungor. “Image Based Crypto.” 2016. Web. 06 May 2021.

Vancouver:

Basa G. Image Based Crypto. [Internet] [Masters thesis]. Oregon State University; 2016. [cited 2021 May 06]. Available from: http://hdl.handle.net/1957/60039.

Council of Science Editors:

Basa G. Image Based Crypto. [Masters Thesis]. Oregon State University; 2016. Available from: http://hdl.handle.net/1957/60039


Rutgers University

2. Durak, Fatma, 1985-. Cryptanalytic study of property-preserving encryption.

Degree: PhD, Computer Science, 2017, Rutgers University

 emph{Property-preserving encryption} (PPE) provides accessible methods to encrypt the databases in an efficient way by preserving specific fuctionalities of databases. PPE as an impactful research… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Durak, Fatma, 1. (2017). Cryptanalytic study of property-preserving encryption. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/55458/

Chicago Manual of Style (16th Edition):

Durak, Fatma, 1985-. “Cryptanalytic study of property-preserving encryption.” 2017. Doctoral Dissertation, Rutgers University. Accessed May 06, 2021. https://rucore.libraries.rutgers.edu/rutgers-lib/55458/.

MLA Handbook (7th Edition):

Durak, Fatma, 1985-. “Cryptanalytic study of property-preserving encryption.” 2017. Web. 06 May 2021.

Vancouver:

Durak, Fatma 1. Cryptanalytic study of property-preserving encryption. [Internet] [Doctoral dissertation]. Rutgers University; 2017. [cited 2021 May 06]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55458/.

Council of Science Editors:

Durak, Fatma 1. Cryptanalytic study of property-preserving encryption. [Doctoral Dissertation]. Rutgers University; 2017. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55458/


University of Illinois – Urbana-Champaign

3. Naveed, Muhammad. Secure and practical computation on encrypted data.

Degree: PhD, Computer Science, 2016, University of Illinois – Urbana-Champaign

 Because of the importance of computing on data with privacy protections, the cryptographic community has developed both theoretical and practical solutions to compute on encrypted… (more)

Subjects/Keywords: computation on encrypted data; property-preserving encryption; symmetric searchable encryption; controlled functional encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naveed, M. (2016). Secure and practical computation on encrypted data. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/90606

Chicago Manual of Style (16th Edition):

Naveed, Muhammad. “Secure and practical computation on encrypted data.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed May 06, 2021. http://hdl.handle.net/2142/90606.

MLA Handbook (7th Edition):

Naveed, Muhammad. “Secure and practical computation on encrypted data.” 2016. Web. 06 May 2021.

Vancouver:

Naveed M. Secure and practical computation on encrypted data. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2021 May 06]. Available from: http://hdl.handle.net/2142/90606.

Council of Science Editors:

Naveed M. Secure and practical computation on encrypted data. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/90606


University of Waterloo

4. Shang, Zhiwei. Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage.

Degree: 2019, University of Waterloo

 Searchable symmetric encryption (SSE) allows a data owner to outsource its data to a cloud server while maintaining the ability to search over it. Most… (more)

Subjects/Keywords: differential privacy; searchable symmetric encryption; Data encryption (Computer science); Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shang, Z. (2019). Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/15348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shang, Zhiwei. “Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage.” 2019. Thesis, University of Waterloo. Accessed May 06, 2021. http://hdl.handle.net/10012/15348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shang, Zhiwei. “Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage.” 2019. Web. 06 May 2021.

Vancouver:

Shang Z. Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage. [Internet] [Thesis]. University of Waterloo; 2019. [cited 2021 May 06]. Available from: http://hdl.handle.net/10012/15348.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shang Z. Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage. [Thesis]. University of Waterloo; 2019. Available from: http://hdl.handle.net/10012/15348

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

5. Cheng, Min Hsuan. A new Modulo Addition with enhanced scalable security against algebraic attack.

Degree: 2016, Ryerson University

 In recent years, Algebraic Attack has emerged to be an important cryptanalysis method in evaluating encryption algorithms. The attack exploits algebraic equations between the inputs… (more)

Subjects/Keywords: Computer algorithms.; Data encryption (Computer science); Cryptography.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, M. H. (2016). A new Modulo Addition with enhanced scalable security against algebraic attack. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A4892

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Min Hsuan. “A new Modulo Addition with enhanced scalable security against algebraic attack.” 2016. Thesis, Ryerson University. Accessed May 06, 2021. https://digital.library.ryerson.ca/islandora/object/RULA%3A4892.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Min Hsuan. “A new Modulo Addition with enhanced scalable security against algebraic attack.” 2016. Web. 06 May 2021.

Vancouver:

Cheng MH. A new Modulo Addition with enhanced scalable security against algebraic attack. [Internet] [Thesis]. Ryerson University; 2016. [cited 2021 May 06]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A4892.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng MH. A new Modulo Addition with enhanced scalable security against algebraic attack. [Thesis]. Ryerson University; 2016. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A4892

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

6. Hu, Zhangxiang. Random access machine in secure multi-party computation.

Degree: MS, Computer Science, 2015, Oregon State University

 Secure multi-party computation (MPC) is a conceptual framework in cryptography. It allows distrusting parties engage in a protocol to perform a computational task while still… (more)

Subjects/Keywords: Secure computation; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, Z. (2015). Random access machine in secure multi-party computation. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/56359

Chicago Manual of Style (16th Edition):

Hu, Zhangxiang. “Random access machine in secure multi-party computation.” 2015. Masters Thesis, Oregon State University. Accessed May 06, 2021. http://hdl.handle.net/1957/56359.

MLA Handbook (7th Edition):

Hu, Zhangxiang. “Random access machine in secure multi-party computation.” 2015. Web. 06 May 2021.

Vancouver:

Hu Z. Random access machine in secure multi-party computation. [Internet] [Masters thesis]. Oregon State University; 2015. [cited 2021 May 06]. Available from: http://hdl.handle.net/1957/56359.

Council of Science Editors:

Hu Z. Random access machine in secure multi-party computation. [Masters Thesis]. Oregon State University; 2015. Available from: http://hdl.handle.net/1957/56359


Stellenbosch University

7. Coetzee, Dirk Badenhorst. The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios.

Degree: MScEng, Electrical and Electronic Engineering, 2013, Stellenbosch University

ENGLISH ABSTRACT: A secure product entitlement system allows one party, such as a pay-TV operator, to broadcast the same collection of information to several receiving… (more)

Subjects/Keywords: Electronic engineering; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coetzee, D. B. (2013). The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios. (Masters Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/80292

Chicago Manual of Style (16th Edition):

Coetzee, Dirk Badenhorst. “The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios.” 2013. Masters Thesis, Stellenbosch University. Accessed May 06, 2021. http://hdl.handle.net/10019.1/80292.

MLA Handbook (7th Edition):

Coetzee, Dirk Badenhorst. “The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios.” 2013. Web. 06 May 2021.

Vancouver:

Coetzee DB. The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios. [Internet] [Masters thesis]. Stellenbosch University; 2013. [cited 2021 May 06]. Available from: http://hdl.handle.net/10019.1/80292.

Council of Science Editors:

Coetzee DB. The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios. [Masters Thesis]. Stellenbosch University; 2013. Available from: http://hdl.handle.net/10019.1/80292


University of Johannesburg

8. Ellefsen, Ian David. A secure steganographic file system with non-duplicating properties.

Degree: 2012, University of Johannesburg

M.Sc.

This dissertation investigates the possibility of a steganographic file system which does not have to duplicate hidden data in order to avoid "collisions" between… (more)

Subjects/Keywords: Cryptography; Computer security; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ellefsen, I. D. (2012). A secure steganographic file system with non-duplicating properties. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7367

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ellefsen, Ian David. “A secure steganographic file system with non-duplicating properties.” 2012. Thesis, University of Johannesburg. Accessed May 06, 2021. http://hdl.handle.net/10210/7367.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ellefsen, Ian David. “A secure steganographic file system with non-duplicating properties.” 2012. Web. 06 May 2021.

Vancouver:

Ellefsen ID. A secure steganographic file system with non-duplicating properties. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2021 May 06]. Available from: http://hdl.handle.net/10210/7367.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ellefsen ID. A secure steganographic file system with non-duplicating properties. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7367

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Victoria

9. Hajiabadi, Mohammad. Encryption security against key-dependent-message attacks: applications, realizations and separations.

Degree: Department of Computer Science, 2016, University of Victoria

 In this thesis we study the notion of circular security for bit-encryption schemes. Informally speaking, a bit-encryption scheme is circular secure if it remains secure… (more)

Subjects/Keywords: Data encryption (Computer science); Public key cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hajiabadi, M. (2016). Encryption security against key-dependent-message attacks: applications, realizations and separations. (Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/7454

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hajiabadi, Mohammad. “Encryption security against key-dependent-message attacks: applications, realizations and separations.” 2016. Thesis, University of Victoria. Accessed May 06, 2021. http://hdl.handle.net/1828/7454.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hajiabadi, Mohammad. “Encryption security against key-dependent-message attacks: applications, realizations and separations.” 2016. Web. 06 May 2021.

Vancouver:

Hajiabadi M. Encryption security against key-dependent-message attacks: applications, realizations and separations. [Internet] [Thesis]. University of Victoria; 2016. [cited 2021 May 06]. Available from: http://hdl.handle.net/1828/7454.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hajiabadi M. Encryption security against key-dependent-message attacks: applications, realizations and separations. [Thesis]. University of Victoria; 2016. Available from: http://hdl.handle.net/1828/7454

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

10. Yang, Zhaoxiong. FPGA-based hardware acceleration of homomorphic encryption for federated learning.

Degree: 2020, Hong Kong University of Science and Technology

 With the increasing awareness of privacy protection and data fragmentation problem, federated learning has been emerging as a new paradigm of machine learning. Federated learning… (more)

Subjects/Keywords: Data encryption (Computer science) ; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, Z. (2020). FPGA-based hardware acceleration of homomorphic encryption for federated learning. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-109036 ; https://doi.org/10.14711/thesis-991012879963103412 ; http://repository.ust.hk/ir/bitstream/1783.1-109036/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yang, Zhaoxiong. “FPGA-based hardware acceleration of homomorphic encryption for federated learning.” 2020. Thesis, Hong Kong University of Science and Technology. Accessed May 06, 2021. http://repository.ust.hk/ir/Record/1783.1-109036 ; https://doi.org/10.14711/thesis-991012879963103412 ; http://repository.ust.hk/ir/bitstream/1783.1-109036/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yang, Zhaoxiong. “FPGA-based hardware acceleration of homomorphic encryption for federated learning.” 2020. Web. 06 May 2021.

Vancouver:

Yang Z. FPGA-based hardware acceleration of homomorphic encryption for federated learning. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2020. [cited 2021 May 06]. Available from: http://repository.ust.hk/ir/Record/1783.1-109036 ; https://doi.org/10.14711/thesis-991012879963103412 ; http://repository.ust.hk/ir/bitstream/1783.1-109036/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yang Z. FPGA-based hardware acceleration of homomorphic encryption for federated learning. [Thesis]. Hong Kong University of Science and Technology; 2020. Available from: http://repository.ust.hk/ir/Record/1783.1-109036 ; https://doi.org/10.14711/thesis-991012879963103412 ; http://repository.ust.hk/ir/bitstream/1783.1-109036/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Massey University

11. Nisbet, Alastair Jon. Encryption key management in wireless ad hoc networks.

Degree: PhD, Computer Science, 2011, Massey University

 Communication is an essential part of everyday life, both as a social interaction and as a means of collaboration to achieve goals. Networking technologies including… (more)

Subjects/Keywords: Data encryption; Wireless networks; Mobile communication systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nisbet, A. J. (2011). Encryption key management in wireless ad hoc networks. (Doctoral Dissertation). Massey University. Retrieved from http://hdl.handle.net/10179/2190

Chicago Manual of Style (16th Edition):

Nisbet, Alastair Jon. “Encryption key management in wireless ad hoc networks.” 2011. Doctoral Dissertation, Massey University. Accessed May 06, 2021. http://hdl.handle.net/10179/2190.

MLA Handbook (7th Edition):

Nisbet, Alastair Jon. “Encryption key management in wireless ad hoc networks.” 2011. Web. 06 May 2021.

Vancouver:

Nisbet AJ. Encryption key management in wireless ad hoc networks. [Internet] [Doctoral dissertation]. Massey University; 2011. [cited 2021 May 06]. Available from: http://hdl.handle.net/10179/2190.

Council of Science Editors:

Nisbet AJ. Encryption key management in wireless ad hoc networks. [Doctoral Dissertation]. Massey University; 2011. Available from: http://hdl.handle.net/10179/2190


Unitec New Zealand

12. Alomirah, Reem Abdulrahman. An edge-based steganography algorithm for hiding text into images.

Degree: 2019, Unitec New Zealand

 RESEARCH QUESTIONS: • How can I improve existing steganography methods in terms of capacity and transparency? • How can I reduce the complexity of existing… (more)

Subjects/Keywords: steganography; steganalysis; edge detection; colour channel; statistical attacks; data security; encryption algorithms; 080402 Data Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alomirah, R. A. (2019). An edge-based steganography algorithm for hiding text into images. (Thesis). Unitec New Zealand. Retrieved from http://hdl.handle.net/10652/4502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alomirah, Reem Abdulrahman. “An edge-based steganography algorithm for hiding text into images.” 2019. Thesis, Unitec New Zealand. Accessed May 06, 2021. http://hdl.handle.net/10652/4502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alomirah, Reem Abdulrahman. “An edge-based steganography algorithm for hiding text into images.” 2019. Web. 06 May 2021.

Vancouver:

Alomirah RA. An edge-based steganography algorithm for hiding text into images. [Internet] [Thesis]. Unitec New Zealand; 2019. [cited 2021 May 06]. Available from: http://hdl.handle.net/10652/4502.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alomirah RA. An edge-based steganography algorithm for hiding text into images. [Thesis]. Unitec New Zealand; 2019. Available from: http://hdl.handle.net/10652/4502

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

13. John singh K. Efficient joint compression and encryption techniques for video data;.

Degree: Joint compression and encryption techniques for video data, 2014, Anna University

With the rapid growth in digital technologies and communication newlinetransmission of videos and images over Internet is unsecured due to various newlinesecurity threats and eavesdropping… (more)

Subjects/Keywords: Fast Random Bit Encryption; Information and communication engineering; Joint Video Compression and Encryption; Puzzle Fast Random Bit Encryption; Video data

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

K, J. s. (2014). Efficient joint compression and encryption techniques for video data;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/22998

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

K, John singh. “Efficient joint compression and encryption techniques for video data;.” 2014. Thesis, Anna University. Accessed May 06, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/22998.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

K, John singh. “Efficient joint compression and encryption techniques for video data;.” 2014. Web. 06 May 2021.

Vancouver:

K Js. Efficient joint compression and encryption techniques for video data;. [Internet] [Thesis]. Anna University; 2014. [cited 2021 May 06]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22998.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

K Js. Efficient joint compression and encryption techniques for video data;. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/22998

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

14. Martin, Russell F. Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption.

Degree: MS, Computer Engineering, 2013, Rochester Institute of Technology

  Ciphertext-Policy Attribute-Based Encryption (CPABE) was introduced by Bethencourt, Sahai, and Waters, as an improvement of Identity Based Encryption, allowing fine grained control of access… (more)

Subjects/Keywords: Attitude based encryption; Cryptography; Public key infrastructure (Computer security); Data encryption (Computer science); Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martin, R. F. (2013). Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/967

Chicago Manual of Style (16th Edition):

Martin, Russell F. “Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption.” 2013. Masters Thesis, Rochester Institute of Technology. Accessed May 06, 2021. https://scholarworks.rit.edu/theses/967.

MLA Handbook (7th Edition):

Martin, Russell F. “Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption.” 2013. Web. 06 May 2021.

Vancouver:

Martin RF. Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption. [Internet] [Masters thesis]. Rochester Institute of Technology; 2013. [cited 2021 May 06]. Available from: https://scholarworks.rit.edu/theses/967.

Council of Science Editors:

Martin RF. Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption. [Masters Thesis]. Rochester Institute of Technology; 2013. Available from: https://scholarworks.rit.edu/theses/967


California State University – San Bernardino

15. Lopez, Samuel. MODERN CRYPTOGRAPHY.

Degree: MAin Mathematics, Mathematics, 2018, California State University – San Bernardino

  We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over… (more)

Subjects/Keywords: Cryptography; Data Encryption Standard; Advanced Encryption Standard; RSA; Discrete Logarithm Problem; Information Security; Number Theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lopez, S. (2018). MODERN CRYPTOGRAPHY. (Thesis). California State University – San Bernardino. Retrieved from https://scholarworks.lib.csusb.edu/etd/729

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lopez, Samuel. “MODERN CRYPTOGRAPHY.” 2018. Thesis, California State University – San Bernardino. Accessed May 06, 2021. https://scholarworks.lib.csusb.edu/etd/729.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lopez, Samuel. “MODERN CRYPTOGRAPHY.” 2018. Web. 06 May 2021.

Vancouver:

Lopez S. MODERN CRYPTOGRAPHY. [Internet] [Thesis]. California State University – San Bernardino; 2018. [cited 2021 May 06]. Available from: https://scholarworks.lib.csusb.edu/etd/729.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lopez S. MODERN CRYPTOGRAPHY. [Thesis]. California State University – San Bernardino; 2018. Available from: https://scholarworks.lib.csusb.edu/etd/729

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

16. Hsu, Wen-che. Privacy Preserving Data Deduplication in Cloud Storage.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 In recent years, cloud computing has become increasingly popular. The goal of cloud computing is to reuse resources such as computing and storage resources. A… (more)

Subjects/Keywords: Data Compression; Encryption; Data Deduplication; Privacy Protection; Cloud Storage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, W. (2013). Privacy Preserving Data Deduplication in Cloud Storage. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712113-103524

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsu, Wen-che. “Privacy Preserving Data Deduplication in Cloud Storage.” 2013. Thesis, NSYSU. Accessed May 06, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712113-103524.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsu, Wen-che. “Privacy Preserving Data Deduplication in Cloud Storage.” 2013. Web. 06 May 2021.

Vancouver:

Hsu W. Privacy Preserving Data Deduplication in Cloud Storage. [Internet] [Thesis]. NSYSU; 2013. [cited 2021 May 06]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712113-103524.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsu W. Privacy Preserving Data Deduplication in Cloud Storage. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712113-103524

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

17. Okere, Irene Onyekachi. A control framework for the assessment of information security culture.

Degree: MTech, Faculty of Business and Economic Sciences, 2013, Nelson Mandela Metropolitan University

 The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal… (more)

Subjects/Keywords: Data encryption (Computer science); Business  – Data processing  – Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Okere, I. O. (2013). A control framework for the assessment of information security culture. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1019861

Chicago Manual of Style (16th Edition):

Okere, Irene Onyekachi. “A control framework for the assessment of information security culture.” 2013. Masters Thesis, Nelson Mandela Metropolitan University. Accessed May 06, 2021. http://hdl.handle.net/10948/d1019861.

MLA Handbook (7th Edition):

Okere, Irene Onyekachi. “A control framework for the assessment of information security culture.” 2013. Web. 06 May 2021.

Vancouver:

Okere IO. A control framework for the assessment of information security culture. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2021 May 06]. Available from: http://hdl.handle.net/10948/d1019861.

Council of Science Editors:

Okere IO. A control framework for the assessment of information security culture. [Masters Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1019861


Nanyang Technological University

18. Fawad, Ahmed. Encryption, authentication and copyright protection techniques for digital images .

Degree: 2010, Nanyang Technological University

 For the past several years, a lot of research work has been underway to devise security techniques to protect multimedia data like audio, image and… (more)

Subjects/Keywords: DRNTU::Engineering::Computer science and engineering::Data::Data encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fawad, A. (2010). Encryption, authentication and copyright protection techniques for digital images . (Thesis). Nanyang Technological University. Retrieved from http://hdl.handle.net/10356/46246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fawad, Ahmed. “Encryption, authentication and copyright protection techniques for digital images .” 2010. Thesis, Nanyang Technological University. Accessed May 06, 2021. http://hdl.handle.net/10356/46246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fawad, Ahmed. “Encryption, authentication and copyright protection techniques for digital images .” 2010. Web. 06 May 2021.

Vancouver:

Fawad A. Encryption, authentication and copyright protection techniques for digital images . [Internet] [Thesis]. Nanyang Technological University; 2010. [cited 2021 May 06]. Available from: http://hdl.handle.net/10356/46246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fawad A. Encryption, authentication and copyright protection techniques for digital images . [Thesis]. Nanyang Technological University; 2010. Available from: http://hdl.handle.net/10356/46246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nanyang Technological University

19. Su, Le. Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation .

Degree: 2015, Nanyang Technological University

 Over the past decade, the emerging of pairing-based cryptography has attracted not only the attention from academic circle, but also industrial organizations. Starting from key… (more)

Subjects/Keywords: DRNTU::Engineering::Computer science and engineering::Data::Data encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Su, L. (2015). Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation . (Thesis). Nanyang Technological University. Retrieved from http://hdl.handle.net/10356/65244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Su, Le. “Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation .” 2015. Thesis, Nanyang Technological University. Accessed May 06, 2021. http://hdl.handle.net/10356/65244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Su, Le. “Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation .” 2015. Web. 06 May 2021.

Vancouver:

Su L. Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation . [Internet] [Thesis]. Nanyang Technological University; 2015. [cited 2021 May 06]. Available from: http://hdl.handle.net/10356/65244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Su L. Pairing-based constructions : efficient revocation, compact ciphertexts and generic transformation . [Thesis]. Nanyang Technological University; 2015. Available from: http://hdl.handle.net/10356/65244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nanyang Technological University

20. Jap, Dirmanto. Physical attacks on block ciphers .

Degree: 2016, Nanyang Technological University

 The security of a cryptosystem is often compromised, not from a theoretical point of view, but by the leakage caused by the physical implementation of… (more)

Subjects/Keywords: DRNTU::Engineering::Computer science and engineering::Data::Data encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jap, D. (2016). Physical attacks on block ciphers . (Thesis). Nanyang Technological University. Retrieved from http://hdl.handle.net/10356/69409

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jap, Dirmanto. “Physical attacks on block ciphers .” 2016. Thesis, Nanyang Technological University. Accessed May 06, 2021. http://hdl.handle.net/10356/69409.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jap, Dirmanto. “Physical attacks on block ciphers .” 2016. Web. 06 May 2021.

Vancouver:

Jap D. Physical attacks on block ciphers . [Internet] [Thesis]. Nanyang Technological University; 2016. [cited 2021 May 06]. Available from: http://hdl.handle.net/10356/69409.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jap D. Physical attacks on block ciphers . [Thesis]. Nanyang Technological University; 2016. Available from: http://hdl.handle.net/10356/69409

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

21. Chui, Sung Him. On encrypted-domain signal processing.

Degree: 2013, Hong Kong University of Science and Technology

 In this big data era, often a person (say Bob) needs another person (say Alice) to perform processing on his data. But both Alice and… (more)

Subjects/Keywords: Signal processing ; Data processing ; Cryptography ; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chui, S. H. (2013). On encrypted-domain signal processing. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-62302 ; https://doi.org/10.14711/thesis-b1251097 ; http://repository.ust.hk/ir/bitstream/1783.1-62302/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chui, Sung Him. “On encrypted-domain signal processing.” 2013. Thesis, Hong Kong University of Science and Technology. Accessed May 06, 2021. http://repository.ust.hk/ir/Record/1783.1-62302 ; https://doi.org/10.14711/thesis-b1251097 ; http://repository.ust.hk/ir/bitstream/1783.1-62302/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chui, Sung Him. “On encrypted-domain signal processing.” 2013. Web. 06 May 2021.

Vancouver:

Chui SH. On encrypted-domain signal processing. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2013. [cited 2021 May 06]. Available from: http://repository.ust.hk/ir/Record/1783.1-62302 ; https://doi.org/10.14711/thesis-b1251097 ; http://repository.ust.hk/ir/bitstream/1783.1-62302/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chui SH. On encrypted-domain signal processing. [Thesis]. Hong Kong University of Science and Technology; 2013. Available from: http://repository.ust.hk/ir/Record/1783.1-62302 ; https://doi.org/10.14711/thesis-b1251097 ; http://repository.ust.hk/ir/bitstream/1783.1-62302/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

22. Si, Wenpei. Additive synchronous stream ciphers.

Degree: 2012, Hong Kong University of Science and Technology

 Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ciphers are preferred in many applications, since they can destroy… (more)

Subjects/Keywords: Stream ciphers ; Data encryption (Computer science) ; Synchronous data transmission systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Si, W. (2012). Additive synchronous stream ciphers. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-7572 ; https://doi.org/10.14711/thesis-b1180147 ; http://repository.ust.hk/ir/bitstream/1783.1-7572/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Si, Wenpei. “Additive synchronous stream ciphers.” 2012. Thesis, Hong Kong University of Science and Technology. Accessed May 06, 2021. http://repository.ust.hk/ir/Record/1783.1-7572 ; https://doi.org/10.14711/thesis-b1180147 ; http://repository.ust.hk/ir/bitstream/1783.1-7572/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Si, Wenpei. “Additive synchronous stream ciphers.” 2012. Web. 06 May 2021.

Vancouver:

Si W. Additive synchronous stream ciphers. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2012. [cited 2021 May 06]. Available from: http://repository.ust.hk/ir/Record/1783.1-7572 ; https://doi.org/10.14711/thesis-b1180147 ; http://repository.ust.hk/ir/bitstream/1783.1-7572/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Si W. Additive synchronous stream ciphers. [Thesis]. Hong Kong University of Science and Technology; 2012. Available from: http://repository.ust.hk/ir/Record/1783.1-7572 ; https://doi.org/10.14711/thesis-b1180147 ; http://repository.ust.hk/ir/bitstream/1783.1-7572/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Indian Institute of Science

23. Suresh, V. Image Structures For Steganalysis And Encryption.

Degree: PhD, Faculty of Engineering, 2013, Indian Institute of Science

 In this work we study two aspects of image security: improper usage and illegal access of images. In the first part we present our results… (more)

Subjects/Keywords: Image Processing; Image Encryption; Images - Steganography; Steganalysis; Image Security; Multimedia Encryption; Data Stream Analysis; Image Encryption - Space Filling Curves; Image Encryption; Singular Value Decomposition (SVD); Hilbert Images; Steganography; Applied Optics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Suresh, V. (2013). Image Structures For Steganalysis And Encryption. (Doctoral Dissertation). Indian Institute of Science. Retrieved from http://etd.iisc.ac.in/handle/2005/2273

Chicago Manual of Style (16th Edition):

Suresh, V. “Image Structures For Steganalysis And Encryption.” 2013. Doctoral Dissertation, Indian Institute of Science. Accessed May 06, 2021. http://etd.iisc.ac.in/handle/2005/2273.

MLA Handbook (7th Edition):

Suresh, V. “Image Structures For Steganalysis And Encryption.” 2013. Web. 06 May 2021.

Vancouver:

Suresh V. Image Structures For Steganalysis And Encryption. [Internet] [Doctoral dissertation]. Indian Institute of Science; 2013. [cited 2021 May 06]. Available from: http://etd.iisc.ac.in/handle/2005/2273.

Council of Science Editors:

Suresh V. Image Structures For Steganalysis And Encryption. [Doctoral Dissertation]. Indian Institute of Science; 2013. Available from: http://etd.iisc.ac.in/handle/2005/2273


NSYSU

24. Cheng, Chen-Kai. Secure File Transfer Procotol for Named Data Network.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 In traditional TCP/IP network architecture, computer systems communicate with each other based on IP address; Because of usersâ network flow requirement and usage amount nowadays,… (more)

Subjects/Keywords: Secure Transfer Protocol; Authorization; Proxy Re-Encryption; Named Data Network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, C. (2013). Secure File Transfer Procotol for Named Data Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Chen-Kai. “Secure File Transfer Procotol for Named Data Network.” 2013. Thesis, NSYSU. Accessed May 06, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Chen-Kai. “Secure File Transfer Procotol for Named Data Network.” 2013. Web. 06 May 2021.

Vancouver:

Cheng C. Secure File Transfer Procotol for Named Data Network. [Internet] [Thesis]. NSYSU; 2013. [cited 2021 May 06]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng C. Secure File Transfer Procotol for Named Data Network. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

25. Cho, Yan-Fu. Authenticated Re-Encryption Scheme for Named Data Network.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 With the rapid growth of technology and the Internet, the digital communication is increasingly based on the architecture of TCP/IP. However, TCP/IPâs architecture has limitations… (more)

Subjects/Keywords: Authentication; Secure Transfer Protocol; Named Data Network; Proxy Re-Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cho, Y. (2014). Authenticated Re-Encryption Scheme for Named Data Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Thesis, NSYSU. Accessed May 06, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Web. 06 May 2021.

Vancouver:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 May 06]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

26. Yang, Wen-Chun. Hardware realization for Advanced Encryption Standard key generation.

Degree: MS, Electrical and Computer Engineering, 2005, Oregon State University

 Advanced Encryption Standard (AES) is one of the secret key algorithms used in Cryptography. It is applied in a variety of applications including smart cards,… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, W. (2005). Hardware realization for Advanced Encryption Standard key generation. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/10310

Chicago Manual of Style (16th Edition):

Yang, Wen-Chun. “Hardware realization for Advanced Encryption Standard key generation.” 2005. Masters Thesis, Oregon State University. Accessed May 06, 2021. http://hdl.handle.net/1957/10310.

MLA Handbook (7th Edition):

Yang, Wen-Chun. “Hardware realization for Advanced Encryption Standard key generation.” 2005. Web. 06 May 2021.

Vancouver:

Yang W. Hardware realization for Advanced Encryption Standard key generation. [Internet] [Masters thesis]. Oregon State University; 2005. [cited 2021 May 06]. Available from: http://hdl.handle.net/1957/10310.

Council of Science Editors:

Yang W. Hardware realization for Advanced Encryption Standard key generation. [Masters Thesis]. Oregon State University; 2005. Available from: http://hdl.handle.net/1957/10310


Oregon State University

27. Shamsuddin, Rayees. A comparative study of AES implementations on ARM processors.

Degree: MS, Electrical and Computer Engineering, 2005, Oregon State University

 AES (Advanced Encryption Standard), also known as Rijndael, is a symmetric key block cipher adopted as an encryption standard by the US government and used… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shamsuddin, R. (2005). A comparative study of AES implementations on ARM processors. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/10307

Chicago Manual of Style (16th Edition):

Shamsuddin, Rayees. “A comparative study of AES implementations on ARM processors.” 2005. Masters Thesis, Oregon State University. Accessed May 06, 2021. http://hdl.handle.net/1957/10307.

MLA Handbook (7th Edition):

Shamsuddin, Rayees. “A comparative study of AES implementations on ARM processors.” 2005. Web. 06 May 2021.

Vancouver:

Shamsuddin R. A comparative study of AES implementations on ARM processors. [Internet] [Masters thesis]. Oregon State University; 2005. [cited 2021 May 06]. Available from: http://hdl.handle.net/1957/10307.

Council of Science Editors:

Shamsuddin R. A comparative study of AES implementations on ARM processors. [Masters Thesis]. Oregon State University; 2005. Available from: http://hdl.handle.net/1957/10307


Oregon State University

28. Banerjee, Uday. Hardware encryption using the MPC180 security co-processor.

Degree: MS, Electrical and Computer Engineering, 2003, Oregon State University

 Hardware cryptography offers a reliable way to provide security for data that is sent over networks. Security processors have taken the stage in the movement… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Banerjee, U. (2003). Hardware encryption using the MPC180 security co-processor. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/10465

Chicago Manual of Style (16th Edition):

Banerjee, Uday. “Hardware encryption using the MPC180 security co-processor.” 2003. Masters Thesis, Oregon State University. Accessed May 06, 2021. http://hdl.handle.net/1957/10465.

MLA Handbook (7th Edition):

Banerjee, Uday. “Hardware encryption using the MPC180 security co-processor.” 2003. Web. 06 May 2021.

Vancouver:

Banerjee U. Hardware encryption using the MPC180 security co-processor. [Internet] [Masters thesis]. Oregon State University; 2003. [cited 2021 May 06]. Available from: http://hdl.handle.net/1957/10465.

Council of Science Editors:

Banerjee U. Hardware encryption using the MPC180 security co-processor. [Masters Thesis]. Oregon State University; 2003. Available from: http://hdl.handle.net/1957/10465


Oregon State University

29. Barlow, Lelia C. Symmetric encryption with multiple keys : techniques and applications.

Degree: MS, Electrical and Computer Engineering, 2005, Oregon State University

 Symmetric key block ciphers, such as AES, are well known and frequently used. There are five confidentiality modes of operation that are currently recommended for… (more)

Subjects/Keywords: Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barlow, L. C. (2005). Symmetric encryption with multiple keys : techniques and applications. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/11719

Chicago Manual of Style (16th Edition):

Barlow, Lelia C. “Symmetric encryption with multiple keys : techniques and applications.” 2005. Masters Thesis, Oregon State University. Accessed May 06, 2021. http://hdl.handle.net/1957/11719.

MLA Handbook (7th Edition):

Barlow, Lelia C. “Symmetric encryption with multiple keys : techniques and applications.” 2005. Web. 06 May 2021.

Vancouver:

Barlow LC. Symmetric encryption with multiple keys : techniques and applications. [Internet] [Masters thesis]. Oregon State University; 2005. [cited 2021 May 06]. Available from: http://hdl.handle.net/1957/11719.

Council of Science Editors:

Barlow LC. Symmetric encryption with multiple keys : techniques and applications. [Masters Thesis]. Oregon State University; 2005. Available from: http://hdl.handle.net/1957/11719


Ryerson University

30. Nasim, Amber, S. Chaos based cryptogrphy (cryptography) and image encryption.

Degree: 2015, Ryerson University

 Chaotic cryptography pronounces the use of chaos theory in specific physical dynamical systems working in chaotic system as measure of communication techniques and computation algorithms… (more)

Subjects/Keywords: Cryptography; Data encryption (Computer science); Group theory; Coding theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nasim, Amber, S. (2015). Chaos based cryptogrphy (cryptography) and image encryption. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A3747

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nasim, Amber, S. “Chaos based cryptogrphy (cryptography) and image encryption.” 2015. Thesis, Ryerson University. Accessed May 06, 2021. https://digital.library.ryerson.ca/islandora/object/RULA%3A3747.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nasim, Amber, S. “Chaos based cryptogrphy (cryptography) and image encryption.” 2015. Web. 06 May 2021.

Vancouver:

Nasim, Amber S. Chaos based cryptogrphy (cryptography) and image encryption. [Internet] [Thesis]. Ryerson University; 2015. [cited 2021 May 06]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3747.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nasim, Amber S. Chaos based cryptogrphy (cryptography) and image encryption. [Thesis]. Ryerson University; 2015. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3747

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [11]

.