Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Mobile computing Security measures ). Showing records 1 – 30 of 31490 total matches.

[1] [2] [3] [4] [5] … [1050]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters


Rhodes University

1. Mayisela, Simphiwe Hector. Data-centric security : towards a utopian model for protecting corporate data on mobile devices.

Degree: Faculty of Science, Computer Science, 2014, Rhodes University

 Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures; Business enterprises  – Computer networks  – Security measures; Mobile computing  – Security measures; Mobile communication systems  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mayisela, S. H. (2014). Data-centric security : towards a utopian model for protecting corporate data on mobile devices. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Thesis, Rhodes University. Accessed March 26, 2019. http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mayisela, Simphiwe Hector. “Data-centric security : towards a utopian model for protecting corporate data on mobile devices.” 2014. Web. 26 Mar 2019.

Vancouver:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Internet] [Thesis]. Rhodes University; 2014. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10962/d1011094.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mayisela SH. Data-centric security : towards a utopian model for protecting corporate data on mobile devices. [Thesis]. Rhodes University; 2014. Available from: http://hdl.handle.net/10962/d1011094

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

2. Frauenstein, Edwin Donald. A framework to mitigate phishing threats.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2013, Nelson Mandela Metropolitan University

 We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld… (more)

Subjects/Keywords: Computer networks  – Security measures; Mobile computing  – Security measures; Online social networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frauenstein, E. D. (2013). A framework to mitigate phishing threats. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Thesis, Nelson Mandela Metropolitan University. Accessed March 26, 2019. http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Frauenstein, Edwin Donald. “A framework to mitigate phishing threats.” 2013. Web. 26 Mar 2019.

Vancouver:

Frauenstein ED. A framework to mitigate phishing threats. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10948/d1021208.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Frauenstein ED. A framework to mitigate phishing threats. [Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1021208

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Stellenbosch University

3. Brand, Johanna Catherina. The governance of significant enterprise mobility security risks.

Degree: MComm, School of Accountancy, 2013, Stellenbosch University

ENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous risks originate from using mobile devices for business-related tasks and most… (more)

Subjects/Keywords: Computer auditing; Computer security  – Management; Business enterprises  – Information technology  – Security measures.; Mobile communication systems  – Security measures; Mobile computing  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brand, J. C. (2013). The governance of significant enterprise mobility security risks. (Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/85853

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Brand, Johanna Catherina. “The governance of significant enterprise mobility security risks.” 2013. Thesis, Stellenbosch University. Accessed March 26, 2019. http://hdl.handle.net/10019.1/85853.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Brand, Johanna Catherina. “The governance of significant enterprise mobility security risks.” 2013. Web. 26 Mar 2019.

Vancouver:

Brand JC. The governance of significant enterprise mobility security risks. [Internet] [Thesis]. Stellenbosch University; 2013. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10019.1/85853.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Brand JC. The governance of significant enterprise mobility security risks. [Thesis]. Stellenbosch University; 2013. Available from: http://hdl.handle.net/10019.1/85853

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

4. Zhang, Shanfeng CSE. Practical mobile sensing applications with privacy protection.

Degree: 2015, Hong Kong University of Science and Technology

Mobile sensing is becoming an important part of people’s daily life. Thanks to various sensors equipped on devices such as smartphones and wearable devices, a… (more)

Subjects/Keywords: Sensor networks; Security measures; Mobile communication systems; Mobile computing; Computer networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, S. C. (2015). Practical mobile sensing applications with privacy protection. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b1546045 ; http://repository.ust.hk/ir/bitstream/1783.1-94707/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Shanfeng CSE. “Practical mobile sensing applications with privacy protection.” 2015. Thesis, Hong Kong University of Science and Technology. Accessed March 26, 2019. https://doi.org/10.14711/thesis-b1546045 ; http://repository.ust.hk/ir/bitstream/1783.1-94707/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Shanfeng CSE. “Practical mobile sensing applications with privacy protection.” 2015. Web. 26 Mar 2019.

Vancouver:

Zhang SC. Practical mobile sensing applications with privacy protection. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2015. [cited 2019 Mar 26]. Available from: https://doi.org/10.14711/thesis-b1546045 ; http://repository.ust.hk/ir/bitstream/1783.1-94707/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang SC. Practical mobile sensing applications with privacy protection. [Thesis]. Hong Kong University of Science and Technology; 2015. Available from: https://doi.org/10.14711/thesis-b1546045 ; http://repository.ust.hk/ir/bitstream/1783.1-94707/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Stellenbosch University

5. Sahd, Lize-Marie. A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level.

Degree: MComm, 2015, Stellenbosch University

ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in… (more)

Subjects/Keywords: Mobile computing; Mobile communication systems; Business enterprises  – Computer networks  – Security measures; Mobile computing  – Security measures; Computer security; Mobile computing  – Risk management; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sahd, L. (2015). A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level. (Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/96674

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sahd, Lize-Marie. “A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level.” 2015. Thesis, Stellenbosch University. Accessed March 26, 2019. http://hdl.handle.net/10019.1/96674.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sahd, Lize-Marie. “A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level.” 2015. Web. 26 Mar 2019.

Vancouver:

Sahd L. A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level. [Internet] [Thesis]. Stellenbosch University; 2015. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10019.1/96674.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sahd L. A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level. [Thesis]. Stellenbosch University; 2015. Available from: http://hdl.handle.net/10019.1/96674

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

6. Negahban, Arash. Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals.

Degree: 2015, University of North Texas

 Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era… (more)

Subjects/Keywords: risky IT behavior; IT security; mobile devices; protective IT behavior; information systems security; Mobile computing  – Security measures.; Mobile communication systems  – Security measures.; Computer security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Negahban, A. (2015). Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc804895/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Negahban, Arash. “Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals.” 2015. Thesis, University of North Texas. Accessed March 26, 2019. https://digital.library.unt.edu/ark:/67531/metadc804895/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Negahban, Arash. “Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals.” 2015. Web. 26 Mar 2019.

Vancouver:

Negahban A. Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals. [Internet] [Thesis]. University of North Texas; 2015. [cited 2019 Mar 26]. Available from: https://digital.library.unt.edu/ark:/67531/metadc804895/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Negahban A. Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals. [Thesis]. University of North Texas; 2015. Available from: https://digital.library.unt.edu/ark:/67531/metadc804895/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Northeastern University

7. Cassola, Aldo. Providing privacy from the residential cloud.

Degree: PhD, College of Computer and Information Science, 2015, Northeastern University

 The growth of mobile devices and computing has continued in recent years to the point where mobile network providers must not only upgrade their networks… (more)

Subjects/Keywords: anonymity; broadband; privacy; residential; security; Wi-Fi; Computer Sciences; Computer networks; Security measures; Web services; Security measures; Cloud computing; Security measures; Mobile computing; Security measures; Wireless LANs; Security measures; Broadband communication systems; Security measures; Privacy, Right of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cassola, A. (2015). Providing privacy from the residential cloud. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/d20128811

Chicago Manual of Style (16th Edition):

Cassola, Aldo. “Providing privacy from the residential cloud.” 2015. Doctoral Dissertation, Northeastern University. Accessed March 26, 2019. http://hdl.handle.net/2047/d20128811.

MLA Handbook (7th Edition):

Cassola, Aldo. “Providing privacy from the residential cloud.” 2015. Web. 26 Mar 2019.

Vancouver:

Cassola A. Providing privacy from the residential cloud. [Internet] [Doctoral dissertation]. Northeastern University; 2015. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/2047/d20128811.

Council of Science Editors:

Cassola A. Providing privacy from the residential cloud. [Doctoral Dissertation]. Northeastern University; 2015. Available from: http://hdl.handle.net/2047/d20128811


Florida Atlantic University

8. Danda, Naga Prakash. Smart campus.

Degree: MS, 2014, Florida Atlantic University

Summary: The Smart Campus project envisions a university campus where technology assists faculty, staff, students and visitors to improve and more efficiently accomplish their daily… (more)

Subjects/Keywords: Mobile communication systems  – Security measures; Technological innovations  – Social aspects; Ubiquitous computing; Universities and colleges  – Design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Danda, N. P. (2014). Smart campus. (Masters Thesis). Florida Atlantic University. Retrieved from http://purl.flvc.org/fau/fd/FA00004098 ; (URL) http://purl.flvc.org/fau/fd/FA00004098

Chicago Manual of Style (16th Edition):

Danda, Naga Prakash. “Smart campus.” 2014. Masters Thesis, Florida Atlantic University. Accessed March 26, 2019. http://purl.flvc.org/fau/fd/FA00004098 ; (URL) http://purl.flvc.org/fau/fd/FA00004098.

MLA Handbook (7th Edition):

Danda, Naga Prakash. “Smart campus.” 2014. Web. 26 Mar 2019.

Vancouver:

Danda NP. Smart campus. [Internet] [Masters thesis]. Florida Atlantic University; 2014. [cited 2019 Mar 26]. Available from: http://purl.flvc.org/fau/fd/FA00004098 ; (URL) http://purl.flvc.org/fau/fd/FA00004098.

Council of Science Editors:

Danda NP. Smart campus. [Masters Thesis]. Florida Atlantic University; 2014. Available from: http://purl.flvc.org/fau/fd/FA00004098 ; (URL) http://purl.flvc.org/fau/fd/FA00004098


University of Hong Kong

9. 陳鴻群; Chen, Hung-kwan. A novel architecture for secure database processing in cloud computing.

Degree: PhD, 2016, University of Hong Kong

Security, particularly data privacy, is one of the biggest barriers to the adoption of Database-as-a-Service (DBaaS) in Cloud Computing. Recent security breaches demonstrate that a… (more)

Subjects/Keywords: Cloud computing - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

陳鴻群; Chen, H. (2016). A novel architecture for secure database processing in cloud computing. (Doctoral Dissertation). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/236590

Chicago Manual of Style (16th Edition):

陳鴻群; Chen, Hung-kwan. “A novel architecture for secure database processing in cloud computing.” 2016. Doctoral Dissertation, University of Hong Kong. Accessed March 26, 2019. http://hdl.handle.net/10722/236590.

MLA Handbook (7th Edition):

陳鴻群; Chen, Hung-kwan. “A novel architecture for secure database processing in cloud computing.” 2016. Web. 26 Mar 2019.

Vancouver:

陳鴻群; Chen H. A novel architecture for secure database processing in cloud computing. [Internet] [Doctoral dissertation]. University of Hong Kong; 2016. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10722/236590.

Council of Science Editors:

陳鴻群; Chen H. A novel architecture for secure database processing in cloud computing. [Doctoral Dissertation]. University of Hong Kong; 2016. Available from: http://hdl.handle.net/10722/236590


IUPUI

10. Yu, Min-Chieh. A secure mobile agent e-commerce protocol.

Degree: 2015, IUPUI

Indiana University-Purdue University Indianapolis (IUPUI)

There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code… (more)

Subjects/Keywords: Mobile Agent; E-commerce; Electronic commerce  – Security measures  – Research  – Methodology; Electronic commerce  – Computer programs  – Research; Electronic commerce  – Purchasing; Mobile commerce  – Cryptography; Mobile agents (Computer software)  – Research; Business enterprises  – Computer networks  – Security measures; Mobile computing  – Security measures  – Research; Computer security  – Research

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, M. (2015). A secure mobile agent e-commerce protocol. (Thesis). IUPUI. Retrieved from http://hdl.handle.net/1805/10117 ; http://dx.doi.org/10.7912/C21G6V

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Min-Chieh. “A secure mobile agent e-commerce protocol.” 2015. Thesis, IUPUI. Accessed March 26, 2019. http://hdl.handle.net/1805/10117 ; http://dx.doi.org/10.7912/C21G6V.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Min-Chieh. “A secure mobile agent e-commerce protocol.” 2015. Web. 26 Mar 2019.

Vancouver:

Yu M. A secure mobile agent e-commerce protocol. [Internet] [Thesis]. IUPUI; 2015. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/1805/10117 ; http://dx.doi.org/10.7912/C21G6V.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu M. A secure mobile agent e-commerce protocol. [Thesis]. IUPUI; 2015. Available from: http://hdl.handle.net/1805/10117 ; http://dx.doi.org/10.7912/C21G6V

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


IUPUI

11. Yu, Min-Chieh. A secure mobile agent e-commerce protocol.

Degree: 2015, IUPUI

Indiana University-Purdue University Indianapolis (IUPUI)

There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code… (more)

Subjects/Keywords: Mobile Agent; E-commerce; Electronic commerce  – Security measures  – Research  – Methodology; Electronic commerce  – Computer programs  – Research; Electronic commerce  – Purchasing; Mobile commerce  – Cryptography; Mobile agents (Computer software)  – Research; Business enterprises  – Computer networks  – Security measures; Mobile computing  – Security measures  – Research; Computer security  – Research

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, M. (2015). A secure mobile agent e-commerce protocol. (Thesis). IUPUI. Retrieved from http://hdl.handle.net/1805/10117

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Min-Chieh. “A secure mobile agent e-commerce protocol.” 2015. Thesis, IUPUI. Accessed March 26, 2019. http://hdl.handle.net/1805/10117.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Min-Chieh. “A secure mobile agent e-commerce protocol.” 2015. Web. 26 Mar 2019.

Vancouver:

Yu M. A secure mobile agent e-commerce protocol. [Internet] [Thesis]. IUPUI; 2015. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/1805/10117.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu M. A secure mobile agent e-commerce protocol. [Thesis]. IUPUI; 2015. Available from: http://hdl.handle.net/1805/10117

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Allam, Sean. A model to measure the maturuty of smartphone security at software consultancies.

Degree: M.Com.(Information Systems), Faculty of Management and Commerce, 2009, University of Fort Hare

 Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and… (more)

Subjects/Keywords: Computer networks – Security measures; Capability maturity model (Computer software); Smartphones; Wireless Internet; Mobile communication systems; Mobile computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Allam, S. (2009). A model to measure the maturuty of smartphone security at software consultancies. (Masters Thesis). University of Fort Hare. Retrieved from http://hdl.handle.net/10353/281

Chicago Manual of Style (16th Edition):

Allam, Sean. “A model to measure the maturuty of smartphone security at software consultancies.” 2009. Masters Thesis, University of Fort Hare. Accessed March 26, 2019. http://hdl.handle.net/10353/281.

MLA Handbook (7th Edition):

Allam, Sean. “A model to measure the maturuty of smartphone security at software consultancies.” 2009. Web. 26 Mar 2019.

Vancouver:

Allam S. A model to measure the maturuty of smartphone security at software consultancies. [Internet] [Masters thesis]. University of Fort Hare; 2009. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10353/281.

Council of Science Editors:

Allam S. A model to measure the maturuty of smartphone security at software consultancies. [Masters Thesis]. University of Fort Hare; 2009. Available from: http://hdl.handle.net/10353/281


University of Missouri – Columbia

13. Wang, Qia, 1985-. Geo-tagging and privacy-preservation in mobile cloud computing.

Degree: 2013, University of Missouri – Columbia

 With the emerge of the cloud computing service and the explosive growth of the mobile devices and applications, mobile computing technologies and cloud computing technologies… (more)

Subjects/Keywords: Data privacy; collaborative data-mining; Geo-tagging system; Compressive sensing (CS) based secure multiparty computation (MPC) framework; Mobile computing; Mobile computing  – Security measures; Cloud computing  – Security measures; Data protection; Privacy; Data mining

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Qia, 1. (2013). Geo-tagging and privacy-preservation in mobile cloud computing. (Thesis). University of Missouri – Columbia. Retrieved from http://hdl.handle.net/10355/42991

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Qia, 1985-. “Geo-tagging and privacy-preservation in mobile cloud computing.” 2013. Thesis, University of Missouri – Columbia. Accessed March 26, 2019. http://hdl.handle.net/10355/42991.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Qia, 1985-. “Geo-tagging and privacy-preservation in mobile cloud computing.” 2013. Web. 26 Mar 2019.

Vancouver:

Wang, Qia 1. Geo-tagging and privacy-preservation in mobile cloud computing. [Internet] [Thesis]. University of Missouri – Columbia; 2013. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10355/42991.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang, Qia 1. Geo-tagging and privacy-preservation in mobile cloud computing. [Thesis]. University of Missouri – Columbia; 2013. Available from: http://hdl.handle.net/10355/42991

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

14. Tvrz, Frankie. Information security of a bluetooth-enabled handheld device.

Degree: 2009, University of Johannesburg

M.Tech.

Mobile handheld devices are moving from being peripheral devices and are now fulfilling functionality provided by laptops and desktops. The capability and functionality of… (more)

Subjects/Keywords: Wireless communication systems - Security measures; Mobile communication systems - Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tvrz, F. (2009). Information security of a bluetooth-enabled handheld device. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tvrz, Frankie. “Information security of a bluetooth-enabled handheld device.” 2009. Thesis, University of Johannesburg. Accessed March 26, 2019. http://hdl.handle.net/10210/3004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tvrz, Frankie. “Information security of a bluetooth-enabled handheld device.” 2009. Web. 26 Mar 2019.

Vancouver:

Tvrz F. Information security of a bluetooth-enabled handheld device. [Internet] [Thesis]. University of Johannesburg; 2009. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10210/3004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tvrz F. Information security of a bluetooth-enabled handheld device. [Thesis]. University of Johannesburg; 2009. Available from: http://hdl.handle.net/10210/3004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

15. Peddi, Rajender D. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.

Degree: 2012, Ryerson University

  This thesis proposes two protocols for addressing collaborative blackhole attacks in MANETs, referred to as the Detecting Blackhole Attack-Dynamic Source Routing (DBA- DSR) and… (more)

Subjects/Keywords: Mobile communication systems; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peddi, R. D. (2012). Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A1615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Peddi, Rajender D. “Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.” 2012. Thesis, Ryerson University. Accessed March 26, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A1615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Peddi, Rajender D. “Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.” 2012. Web. 26 Mar 2019.

Vancouver:

Peddi RD. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. [Internet] [Thesis]. Ryerson University; 2012. [cited 2019 Mar 26]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1615.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Peddi RD. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. [Thesis]. Ryerson University; 2012. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1615

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

16. Shin, Heechang, 1974-. Ensuring security and privacy in a personalized mobile environment.

Degree: PhD, Management, 2010, Rutgers University

Services in a mobile environment are based on the locations of mobile users. Personalization, based on the profiles of mobile users, significantly increases the value… (more)

Subjects/Keywords: Mobile communication systems – Security measures; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shin, Heechang, 1. (2010). Ensuring security and privacy in a personalized mobile environment. (Doctoral Dissertation). Rutgers University. Retrieved from http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056115

Chicago Manual of Style (16th Edition):

Shin, Heechang, 1974-. “Ensuring security and privacy in a personalized mobile environment.” 2010. Doctoral Dissertation, Rutgers University. Accessed March 26, 2019. http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056115.

MLA Handbook (7th Edition):

Shin, Heechang, 1974-. “Ensuring security and privacy in a personalized mobile environment.” 2010. Web. 26 Mar 2019.

Vancouver:

Shin, Heechang 1. Ensuring security and privacy in a personalized mobile environment. [Internet] [Doctoral dissertation]. Rutgers University; 2010. [cited 2019 Mar 26]. Available from: http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056115.

Council of Science Editors:

Shin, Heechang 1. Ensuring security and privacy in a personalized mobile environment. [Doctoral Dissertation]. Rutgers University; 2010. Available from: http://hdl.rutgers.edu/1782.1/rucore10002600001.ETD.000056115


University of North Carolina – Greensboro

17. Whitworth, Jeffrey N. Applying hybrid cloud systems to solve challenges posed by the big data problem.

Degree: 2013, University of North Carolina – Greensboro

 The problem of Big Data poses challenges to traditional compute systems used for Machine Learning (ML) techniques that extract, analyze and visualize important information. New… (more)

Subjects/Keywords: Big data; Cloud computing – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Whitworth, J. N. (2013). Applying hybrid cloud systems to solve challenges posed by the big data problem. (Masters Thesis). University of North Carolina – Greensboro. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603

Chicago Manual of Style (16th Edition):

Whitworth, Jeffrey N. “Applying hybrid cloud systems to solve challenges posed by the big data problem.” 2013. Masters Thesis, University of North Carolina – Greensboro. Accessed March 26, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603.

MLA Handbook (7th Edition):

Whitworth, Jeffrey N. “Applying hybrid cloud systems to solve challenges posed by the big data problem.” 2013. Web. 26 Mar 2019.

Vancouver:

Whitworth JN. Applying hybrid cloud systems to solve challenges posed by the big data problem. [Internet] [Masters thesis]. University of North Carolina – Greensboro; 2013. [cited 2019 Mar 26]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603.

Council of Science Editors:

Whitworth JN. Applying hybrid cloud systems to solve challenges posed by the big data problem. [Masters Thesis]. University of North Carolina – Greensboro; 2013. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603

18. Jacobs, Christoff Jan. A prototype to improve the security and integrity of mobile banking.

Degree: 2015, University of Johannesburg

M.Sc. (Computer Science)

In the rapidly evolving world that we live in, the methods by which items are purchased are starting to be revolutionized. In… (more)

Subjects/Keywords: Mobile computing; Banks and banking, Mobile - Security measures

mobile device is exposed to security risks. SIM card swops showed that one-time passwords are… …the security risks that are currently facing mobile banking clients. This brings us to our… …mobile device, as well as increase the security of the identification and authentication steps… …bank transactions from a mobile device are exposed to security risks. The problem statement… …integrity of a bank transaction from a mobile device, as well as increase the security of the… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jacobs, C. J. (2015). A prototype to improve the security and integrity of mobile banking. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/13812

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jacobs, Christoff Jan. “A prototype to improve the security and integrity of mobile banking.” 2015. Thesis, University of Johannesburg. Accessed March 26, 2019. http://hdl.handle.net/10210/13812.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jacobs, Christoff Jan. “A prototype to improve the security and integrity of mobile banking.” 2015. Web. 26 Mar 2019.

Vancouver:

Jacobs CJ. A prototype to improve the security and integrity of mobile banking. [Internet] [Thesis]. University of Johannesburg; 2015. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10210/13812.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jacobs CJ. A prototype to improve the security and integrity of mobile banking. [Thesis]. University of Johannesburg; 2015. Available from: http://hdl.handle.net/10210/13812

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Sydney

19. Shankaran, Rajan. Security issues in mobile IP and mobile ad hoc networks.

Degree: 2004, University of Western Sydney

 The need for information anywhere and at any time has been the driving force for the increasing growth in mobile networks and devices. The field… (more)

Subjects/Keywords: Doctor of Philosophy (PhD); computer security; mobile computing; security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shankaran, R. (2004). Security issues in mobile IP and mobile ad hoc networks. (Thesis). University of Western Sydney. Retrieved from http://handle.uws.edu.au:8081/1959.7/585

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shankaran, Rajan. “Security issues in mobile IP and mobile ad hoc networks.” 2004. Thesis, University of Western Sydney. Accessed March 26, 2019. http://handle.uws.edu.au:8081/1959.7/585.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shankaran, Rajan. “Security issues in mobile IP and mobile ad hoc networks.” 2004. Web. 26 Mar 2019.

Vancouver:

Shankaran R. Security issues in mobile IP and mobile ad hoc networks. [Internet] [Thesis]. University of Western Sydney; 2004. [cited 2019 Mar 26]. Available from: http://handle.uws.edu.au:8081/1959.7/585.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shankaran R. Security issues in mobile IP and mobile ad hoc networks. [Thesis]. University of Western Sydney; 2004. Available from: http://handle.uws.edu.au:8081/1959.7/585

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

20. Guymon, Daniel Wade. Cyber-physical Algorithms for Enhancing Collaboration.

Degree: MS, Electrical and Computer Engineering, 2012, Virginia Tech

 The research presented in this thesis covers two specific problems within the larger domain of cyber-physical algorithms for enhancing collaboration between one or more people.… (more)

Subjects/Keywords: cyber-physical systems; mobile computing; smartphones; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guymon, D. W. (2012). Cyber-physical Algorithms for Enhancing Collaboration. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/31919

Chicago Manual of Style (16th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Masters Thesis, Virginia Tech. Accessed March 26, 2019. http://hdl.handle.net/10919/31919.

MLA Handbook (7th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Web. 26 Mar 2019.

Vancouver:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Internet] [Masters thesis]. Virginia Tech; 2012. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10919/31919.

Council of Science Editors:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Masters Thesis]. Virginia Tech; 2012. Available from: http://hdl.handle.net/10919/31919


Ryerson University

21. Rashid, Fatema. Secure Data Deduplication in Cloud Environments.

Degree: 2015, Ryerson University

 With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise… (more)

Subjects/Keywords: Cloud computing  – Security measures; Service-oriented architecture (Computer science)  – Security measures; Data warehousing  – Security measures; Database management  – Security measures; Computer networks  – Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rashid, F. (2015). Secure Data Deduplication in Cloud Environments. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A4304

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rashid, Fatema. “Secure Data Deduplication in Cloud Environments.” 2015. Thesis, Ryerson University. Accessed March 26, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A4304.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rashid, Fatema. “Secure Data Deduplication in Cloud Environments.” 2015. Web. 26 Mar 2019.

Vancouver:

Rashid F. Secure Data Deduplication in Cloud Environments. [Internet] [Thesis]. Ryerson University; 2015. [cited 2019 Mar 26]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A4304.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rashid F. Secure Data Deduplication in Cloud Environments. [Thesis]. Ryerson University; 2015. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A4304

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

22. Zamani, Ghazal. The effects of a fault management architecture on the performance of a cloud based application.

Degree: 2017, Ryerson University

 Increasingly, the application providers are using a separate fault management system that offers out-of-the-box monitoring and alarms support for application instances. A fault management system… (more)

Subjects/Keywords: Cloud computing  – Research; Cloud computing  – Management; Cloud computing  – Security measures; Data protection; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zamani, G. (2017). The effects of a fault management architecture on the performance of a cloud based application. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A6424

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zamani, Ghazal. “The effects of a fault management architecture on the performance of a cloud based application.” 2017. Thesis, Ryerson University. Accessed March 26, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A6424.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zamani, Ghazal. “The effects of a fault management architecture on the performance of a cloud based application.” 2017. Web. 26 Mar 2019.

Vancouver:

Zamani G. The effects of a fault management architecture on the performance of a cloud based application. [Internet] [Thesis]. Ryerson University; 2017. [cited 2019 Mar 26]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A6424.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zamani G. The effects of a fault management architecture on the performance of a cloud based application. [Thesis]. Ryerson University; 2017. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A6424

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

23. Fazeen, Mohamed. Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform.

Degree: 2014, University of North Texas

Mobile phones are one of the essential parts of modern life. Making a phone call is not the main purpose of a smart phone anymore,… (more)

Subjects/Keywords: Intention; mobile security; malware; spammers; encryption; electroencephalogram; Mobile communication systems  – Security measures.; Wireless communication systems  – Security measures.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fazeen, M. (2014). Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc700067/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fazeen, Mohamed. “Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform.” 2014. Thesis, University of North Texas. Accessed March 26, 2019. https://digital.library.unt.edu/ark:/67531/metadc700067/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fazeen, Mohamed. “Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform.” 2014. Web. 26 Mar 2019.

Vancouver:

Fazeen M. Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform. [Internet] [Thesis]. University of North Texas; 2014. [cited 2019 Mar 26]. Available from: https://digital.library.unt.edu/ark:/67531/metadc700067/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fazeen M. Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform. [Thesis]. University of North Texas; 2014. Available from: https://digital.library.unt.edu/ark:/67531/metadc700067/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

24. Alkhojandi, Naelah Abdulrahman. Privacy-preserving public auditing with data deduplication in cloud computing.

Degree: 2015, Ryerson University

 Storage represents one of the most commonly used cloud services. Data integrity and storage efficiency are two key requirements when storing users’ data. Public auditability,… (more)

Subjects/Keywords: Cloud computing; Computer security; Cloud computing  – Security measures; Computer storage devices; Data protection; Electronic data processing  – Distributed processing  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alkhojandi, N. A. (2015). Privacy-preserving public auditing with data deduplication in cloud computing. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A3673

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alkhojandi, Naelah Abdulrahman. “Privacy-preserving public auditing with data deduplication in cloud computing.” 2015. Thesis, Ryerson University. Accessed March 26, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A3673.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alkhojandi, Naelah Abdulrahman. “Privacy-preserving public auditing with data deduplication in cloud computing.” 2015. Web. 26 Mar 2019.

Vancouver:

Alkhojandi NA. Privacy-preserving public auditing with data deduplication in cloud computing. [Internet] [Thesis]. Ryerson University; 2015. [cited 2019 Mar 26]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3673.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alkhojandi NA. Privacy-preserving public auditing with data deduplication in cloud computing. [Thesis]. Ryerson University; 2015. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A3673

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ryerson University

25. Koo, Vincent. Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks.

Degree: 2012, Ryerson University

 Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately,… (more)

Subjects/Keywords: Ad hoc networks (Computer networks)  – Security measures; Self-organizing systems  – Security measures; Mobile communication systems  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koo, V. (2012). Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A2169

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koo, Vincent. “Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks.” 2012. Thesis, Ryerson University. Accessed March 26, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A2169.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koo, Vincent. “Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks.” 2012. Web. 26 Mar 2019.

Vancouver:

Koo V. Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks. [Internet] [Thesis]. Ryerson University; 2012. [cited 2019 Mar 26]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A2169.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koo V. Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks. [Thesis]. Ryerson University; 2012. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A2169

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

26. Chen, Shu, 1978-. Providing trustworthiness to the operation of location based services in mobile networks.

Degree: PhD, Computer Science, 2010, Rutgers University

The development of low-cost, ubiquitous, wireless systems is leading to a future where location will define the next generation of computing applications. Location Based services… (more)

Subjects/Keywords: Location-based services; Mobile communication systems – Security measures; Wireless communication systems – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Shu, 1. (2010). Providing trustworthiness to the operation of location based services in mobile networks. (Doctoral Dissertation). Rutgers University. Retrieved from http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000056277

Chicago Manual of Style (16th Edition):

Chen, Shu, 1978-. “Providing trustworthiness to the operation of location based services in mobile networks.” 2010. Doctoral Dissertation, Rutgers University. Accessed March 26, 2019. http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000056277.

MLA Handbook (7th Edition):

Chen, Shu, 1978-. “Providing trustworthiness to the operation of location based services in mobile networks.” 2010. Web. 26 Mar 2019.

Vancouver:

Chen, Shu 1. Providing trustworthiness to the operation of location based services in mobile networks. [Internet] [Doctoral dissertation]. Rutgers University; 2010. [cited 2019 Mar 26]. Available from: http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000056277.

Council of Science Editors:

Chen, Shu 1. Providing trustworthiness to the operation of location based services in mobile networks. [Doctoral Dissertation]. Rutgers University; 2010. Available from: http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000056277


Nelson Mandela Metropolitan University

27. Willett, Melanie. A framework for assuring conformance of cloud-based email at higher education institutions.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2013, Nelson Mandela Metropolitan University

 Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost… (more)

Subjects/Keywords: Cloud computing  – Security measures; Computer networks  – Security measures; Web services; Education, Higher  – Technological innovations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Willett, M. (2013). A framework for assuring conformance of cloud-based email at higher education institutions. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1018664

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Willett, Melanie. “A framework for assuring conformance of cloud-based email at higher education institutions.” 2013. Thesis, Nelson Mandela Metropolitan University. Accessed March 26, 2019. http://hdl.handle.net/10948/d1018664.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Willett, Melanie. “A framework for assuring conformance of cloud-based email at higher education institutions.” 2013. Web. 26 Mar 2019.

Vancouver:

Willett M. A framework for assuring conformance of cloud-based email at higher education institutions. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10948/d1018664.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Willett M. A framework for assuring conformance of cloud-based email at higher education institutions. [Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1018664

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

28. Kativu, Tatenda Kevin. A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2017, Nelson Mandela Metropolitan University

 The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of… (more)

Subjects/Keywords: Mobile computing  – Hospitals  – South Africa; Electronic data processing  – Security measures  – South Africa; Wireless communication systems  – Social aspects; Medical care  – Technological innovations  – Developing countries

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kativu, T. K. (2017). A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/18630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kativu, Tatenda Kevin. “A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed March 26, 2019. http://hdl.handle.net/10948/18630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kativu, Tatenda Kevin. “A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context.” 2017. Web. 26 Mar 2019.

Vancouver:

Kativu TK. A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2019 Mar 26]. Available from: http://hdl.handle.net/10948/18630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kativu TK. A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/18630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Florida Atlantic University

29. Ibriq, Jamil. Secure routing in wireless sensor networks.

Degree: PhD, 2007, Florida Atlantic University

Summary: This research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key… (more)

Subjects/Keywords: Sensor networks – Security measures; Ad hoc networks (Computer networks) – Security measures; Wireless communication systems – Security measures; Wireless communication systems – Technological innovations; Mobile computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ibriq, J. (2007). Secure routing in wireless sensor networks. (Doctoral Dissertation). Florida Atlantic University. Retrieved from http://purl.flvc.org/FAU/42771 ; (URL) http://ezproxy.fau.edu

Chicago Manual of Style (16th Edition):

Ibriq, Jamil. “Secure routing in wireless sensor networks.” 2007. Doctoral Dissertation, Florida Atlantic University. Accessed March 26, 2019. http://purl.flvc.org/FAU/42771 ; (URL) http://ezproxy.fau.edu.

MLA Handbook (7th Edition):

Ibriq, Jamil. “Secure routing in wireless sensor networks.” 2007. Web. 26 Mar 2019.

Vancouver:

Ibriq J. Secure routing in wireless sensor networks. [Internet] [Doctoral dissertation]. Florida Atlantic University; 2007. [cited 2019 Mar 26]. Available from: http://purl.flvc.org/FAU/42771 ; (URL) http://ezproxy.fau.edu.

Council of Science Editors:

Ibriq J. Secure routing in wireless sensor networks. [Doctoral Dissertation]. Florida Atlantic University; 2007. Available from: http://purl.flvc.org/FAU/42771 ; (URL) http://ezproxy.fau.edu


Ryerson University

30. Wang, Ahuang. A Security Enhanced AODV Routing Protocol For Wireless Mesh Networks.

Degree: 2009, Ryerson University

 This thesis introduces a Security Enhanced AODV routing protocol for wireless mesh networks (WMNs).SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key… (more)

Subjects/Keywords: Ad hoc networks (Computer networks); Computer network protocols  – Security measures; Wireless communication systems; Wireless communication systems  – Security measures; Mobile communication systems  – Security measures; Routers (Computer networks)  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, A. (2009). A Security Enhanced AODV Routing Protocol For Wireless Mesh Networks. (Thesis). Ryerson University. Retrieved from https://digital.library.ryerson.ca/islandora/object/RULA%3A1418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Ahuang. “A Security Enhanced AODV Routing Protocol For Wireless Mesh Networks.” 2009. Thesis, Ryerson University. Accessed March 26, 2019. https://digital.library.ryerson.ca/islandora/object/RULA%3A1418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Ahuang. “A Security Enhanced AODV Routing Protocol For Wireless Mesh Networks.” 2009. Web. 26 Mar 2019.

Vancouver:

Wang A. A Security Enhanced AODV Routing Protocol For Wireless Mesh Networks. [Internet] [Thesis]. Ryerson University; 2009. [cited 2019 Mar 26]. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang A. A Security Enhanced AODV Routing Protocol For Wireless Mesh Networks. [Thesis]. Ryerson University; 2009. Available from: https://digital.library.ryerson.ca/islandora/object/RULA%3A1418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [1050]

.