Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Tls). Showing records 1 – 30 of 153 total matches.

[1] [2] [3] [4] [5] [6]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Texas A&M University

1. Jindal, Tanuj. Detecting Tangled Logic Structures in VLSI Netlists.

Degree: 2010, Texas A&M University

 This thesis proposes a new problem of identifying large and tangled logic structures in a synthesized netlist. Large groups of cells that are highly interconnected… (more)

Subjects/Keywords: TLS; Cluster; congestion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jindal, T. (2010). Detecting Tangled Logic Structures in VLSI Netlists. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2010-08-8511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jindal, Tanuj. “Detecting Tangled Logic Structures in VLSI Netlists.” 2010. Thesis, Texas A&M University. Accessed October 22, 2019. http://hdl.handle.net/1969.1/ETD-TAMU-2010-08-8511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jindal, Tanuj. “Detecting Tangled Logic Structures in VLSI Netlists.” 2010. Web. 22 Oct 2019.

Vancouver:

Jindal T. Detecting Tangled Logic Structures in VLSI Netlists. [Internet] [Thesis]. Texas A&M University; 2010. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-08-8511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jindal T. Detecting Tangled Logic Structures in VLSI Netlists. [Thesis]. Texas A&M University; 2010. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-08-8511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. Georges, George. Algorithmes de calcul de positions GNSS basés sur les méthodes des moindres carrés avancées : Algorithms for calculating GNSS position based on methods of least squares advanced.

Degree: Docteur es, Automatique, 2016, Belfort-Montbéliard

Dans ce mémoire, une nouvelle approche neuronale TLS EXIN est proposée pour estimer la position d'un récepteurGPS. L'idée générale de cette approche est d'avoir une… (more)

Subjects/Keywords: GNSS; OLS; WLS; TLS; TLS-EXIN; GNSS; OLS; WLS; TLS; TLS-EXIN; 621.3

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Georges, G. (2016). Algorithmes de calcul de positions GNSS basés sur les méthodes des moindres carrés avancées : Algorithms for calculating GNSS position based on methods of least squares advanced. (Doctoral Dissertation). Belfort-Montbéliard. Retrieved from http://www.theses.fr/2016BELF0298

Chicago Manual of Style (16th Edition):

Georges, George. “Algorithmes de calcul de positions GNSS basés sur les méthodes des moindres carrés avancées : Algorithms for calculating GNSS position based on methods of least squares advanced.” 2016. Doctoral Dissertation, Belfort-Montbéliard. Accessed October 22, 2019. http://www.theses.fr/2016BELF0298.

MLA Handbook (7th Edition):

Georges, George. “Algorithmes de calcul de positions GNSS basés sur les méthodes des moindres carrés avancées : Algorithms for calculating GNSS position based on methods of least squares advanced.” 2016. Web. 22 Oct 2019.

Vancouver:

Georges G. Algorithmes de calcul de positions GNSS basés sur les méthodes des moindres carrés avancées : Algorithms for calculating GNSS position based on methods of least squares advanced. [Internet] [Doctoral dissertation]. Belfort-Montbéliard; 2016. [cited 2019 Oct 22]. Available from: http://www.theses.fr/2016BELF0298.

Council of Science Editors:

Georges G. Algorithmes de calcul de positions GNSS basés sur les méthodes des moindres carrés avancées : Algorithms for calculating GNSS position based on methods of least squares advanced. [Doctoral Dissertation]. Belfort-Montbéliard; 2016. Available from: http://www.theses.fr/2016BELF0298


Ruhr Universität Bochum

3. Meyer, Christopher. 20 years of SSL/TLS research : an analysis of the internets security foundation.

Degree: 2014, Ruhr Universität Bochum

 Die Dissertation analysiert die Sicherheit des Protokolls SSL/TLS, zeigt neue, Angriffe praktischer und theoretischer Art und beschreibt eine neue Technik zur Identifizierung von SSL/TLS Implementierungen… (more)

Subjects/Keywords: SSL; TLS; Angriff; Seitenkanalattacke; Zufallsgenerator

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meyer, C. (2014). 20 years of SSL/TLS research : an analysis of the internets security foundation. (Thesis). Ruhr Universität Bochum. Retrieved from http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-40383

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Meyer, Christopher. “20 years of SSL/TLS research : an analysis of the internets security foundation.” 2014. Thesis, Ruhr Universität Bochum. Accessed October 22, 2019. http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-40383.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Meyer, Christopher. “20 years of SSL/TLS research : an analysis of the internets security foundation.” 2014. Web. 22 Oct 2019.

Vancouver:

Meyer C. 20 years of SSL/TLS research : an analysis of the internets security foundation. [Internet] [Thesis]. Ruhr Universität Bochum; 2014. [cited 2019 Oct 22]. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-40383.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Meyer C. 20 years of SSL/TLS research : an analysis of the internets security foundation. [Thesis]. Ruhr Universität Bochum; 2014. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-40383

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. 亀川, 慧. SSL/TLS の脆弱性と対策手法に関する研究.

Degree: Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学

Supervisor:宮地 充子

情報科学研究科

修士

Subjects/Keywords: SSL/TLS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

亀川, . (n.d.). SSL/TLS の脆弱性と対策手法に関する研究. (Thesis). Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10119/12667

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

亀川, 慧. “SSL/TLS の脆弱性と対策手法に関する研究.” Thesis, Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Accessed October 22, 2019. http://hdl.handle.net/10119/12667.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

亀川, 慧. “SSL/TLS の脆弱性と対策手法に関する研究.” Web. 22 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

亀川 . SSL/TLS の脆弱性と対策手法に関する研究. [Internet] [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; [cited 2019 Oct 22]. Available from: http://hdl.handle.net/10119/12667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

亀川 . SSL/TLS の脆弱性と対策手法に関する研究. [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; Available from: http://hdl.handle.net/10119/12667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Edinburgh

5. Khan, Salman. Putting checkpoints to work in thread level speculative execution.

Degree: PhD, 2010, University of Edinburgh

 With the advent of Chip Multi Processors (CMPs), improving performance relies on the programmers/compilers to expose thread level parallelism to the underlying hardware. Unfortunately, this… (more)

Subjects/Keywords: computer architecture; speculation; checkpointing; TLS; dependence prediction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khan, S. (2010). Putting checkpoints to work in thread level speculative execution. (Doctoral Dissertation). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/4676

Chicago Manual of Style (16th Edition):

Khan, Salman. “Putting checkpoints to work in thread level speculative execution.” 2010. Doctoral Dissertation, University of Edinburgh. Accessed October 22, 2019. http://hdl.handle.net/1842/4676.

MLA Handbook (7th Edition):

Khan, Salman. “Putting checkpoints to work in thread level speculative execution.” 2010. Web. 22 Oct 2019.

Vancouver:

Khan S. Putting checkpoints to work in thread level speculative execution. [Internet] [Doctoral dissertation]. University of Edinburgh; 2010. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/1842/4676.

Council of Science Editors:

Khan S. Putting checkpoints to work in thread level speculative execution. [Doctoral Dissertation]. University of Edinburgh; 2010. Available from: http://hdl.handle.net/1842/4676


Addis Ababa University

6. Solomon, Negussie. Securing Confidentiality and Integrity of SIP Based VoIP System in Reduced Call Setup Time .

Degree: 2014, Addis Ababa University

 Voice over IP is one of the quickest developing Internet services promised to have growing demand. However this demand is challenged by security pitfalls of… (more)

Subjects/Keywords: VoIP; SIP; TLS; Call Setup Time

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Solomon, N. (2014). Securing Confidentiality and Integrity of SIP Based VoIP System in Reduced Call Setup Time . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/5050

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Solomon, Negussie. “Securing Confidentiality and Integrity of SIP Based VoIP System in Reduced Call Setup Time .” 2014. Thesis, Addis Ababa University. Accessed October 22, 2019. http://etd.aau.edu.et/dspace/handle/123456789/5050.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Solomon, Negussie. “Securing Confidentiality and Integrity of SIP Based VoIP System in Reduced Call Setup Time .” 2014. Web. 22 Oct 2019.

Vancouver:

Solomon N. Securing Confidentiality and Integrity of SIP Based VoIP System in Reduced Call Setup Time . [Internet] [Thesis]. Addis Ababa University; 2014. [cited 2019 Oct 22]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/5050.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Solomon N. Securing Confidentiality and Integrity of SIP Based VoIP System in Reduced Call Setup Time . [Thesis]. Addis Ababa University; 2014. Available from: http://etd.aau.edu.et/dspace/handle/123456789/5050

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

7. Cravo, Paula Margarida Mendonça da Silva. Securing ussd in mobile financial transactions.

Degree: 2011, Universidade de Lisboa

 This work analyses an existing mobile-finance scheme at Portuguese PT Inovação, targeting users that do not have a bank account, and using the USSD communication… (more)

Subjects/Keywords: m-finance; confidentiality; SSL/TLS; authenticity; USSD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cravo, P. M. M. d. S. (2011). Securing ussd in mobile financial transactions. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cravo, Paula Margarida Mendonça da Silva. “Securing ussd in mobile financial transactions.” 2011. Thesis, Universidade de Lisboa. Accessed October 22, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cravo, Paula Margarida Mendonça da Silva. “Securing ussd in mobile financial transactions.” 2011. Web. 22 Oct 2019.

Vancouver:

Cravo PMMdS. Securing ussd in mobile financial transactions. [Internet] [Thesis]. Universidade de Lisboa; 2011. [cited 2019 Oct 22]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cravo PMMdS. Securing ussd in mobile financial transactions. [Thesis]. Universidade de Lisboa; 2011. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Ruhr Universität Bochum

8. Bergsma, Florian. Modeling and analyzing cryptographic real-world protocols.

Degree: 2014, Ruhr Universität Bochum

 Sicherheitsanalysen von sogenannten "real-world" Protokollen stellen Forscher vor eine neue Herausforderung: Die echte Welt muss in einem theoretischen Modell abgebildet werden. Die Ergebnisse dieser Arbeit… (more)

Subjects/Keywords: Kommunikationsprotokoll; TLS; SSH; Datensicherung; Kommunikationsprotokoll / Konstruktion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bergsma, F. (2014). Modeling and analyzing cryptographic real-world protocols. (Thesis). Ruhr Universität Bochum. Retrieved from http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43072

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bergsma, Florian. “Modeling and analyzing cryptographic real-world protocols.” 2014. Thesis, Ruhr Universität Bochum. Accessed October 22, 2019. http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43072.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bergsma, Florian. “Modeling and analyzing cryptographic real-world protocols.” 2014. Web. 22 Oct 2019.

Vancouver:

Bergsma F. Modeling and analyzing cryptographic real-world protocols. [Internet] [Thesis]. Ruhr Universität Bochum; 2014. [cited 2019 Oct 22]. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43072.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bergsma F. Modeling and analyzing cryptographic real-world protocols. [Thesis]. Ruhr Universität Bochum; 2014. Available from: http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:hbz:294-43072

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

9. Gustafsson, Josef. Certificate Transparency in Theory and Practice.

Degree: Database and information techniques, 2016, Linköping University

  Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (PKIX) authentication in Transport Layer Security (TLS) protocol. Transparency logs issue signed… (more)

Subjects/Keywords: Transparency; Certificate; SSL; TLS; Authetication; X.509

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gustafsson, J. (2016). Certificate Transparency in Theory and Practice. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gustafsson, Josef. “Certificate Transparency in Theory and Practice.” 2016. Thesis, Linköping University. Accessed October 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gustafsson, Josef. “Certificate Transparency in Theory and Practice.” 2016. Web. 22 Oct 2019.

Vancouver:

Gustafsson J. Certificate Transparency in Theory and Practice. [Internet] [Thesis]. Linköping University; 2016. [cited 2019 Oct 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gustafsson J. Certificate Transparency in Theory and Practice. [Thesis]. Linköping University; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

10. Krokos, Evangelos. Centralized Vehicle License Management on ERTMS : Key Database and Communication between Server and RBC.

Degree: Electrical Engineering (EES), 2016, KTH

Today’s rail industry is under great demand. People will use trains even more in the future. Rail industry has to develop and integrate new… (more)

Subjects/Keywords: TLS; HTTPS; RBC; KMAC; KTRANS; ERTMS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krokos, E. (2016). Centralized Vehicle License Management on ERTMS : Key Database and Communication between Server and RBC. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-197724

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krokos, Evangelos. “Centralized Vehicle License Management on ERTMS : Key Database and Communication between Server and RBC.” 2016. Thesis, KTH. Accessed October 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-197724.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krokos, Evangelos. “Centralized Vehicle License Management on ERTMS : Key Database and Communication between Server and RBC.” 2016. Web. 22 Oct 2019.

Vancouver:

Krokos E. Centralized Vehicle License Management on ERTMS : Key Database and Communication between Server and RBC. [Internet] [Thesis]. KTH; 2016. [cited 2019 Oct 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-197724.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krokos E. Centralized Vehicle License Management on ERTMS : Key Database and Communication between Server and RBC. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-197724

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Debrecen

11. Kanyok, Gergő. Háromdimenziós kiértékelés lézerszkenneres felmérés alapján .

Degree: DE – Természettudományi és Technológiai Kar – Földtudományi Intézet, University of Debrecen

A diplomadolgozatommal célom az adott projekt, a kapott adat ellenőrzésének és feldolgozásra való előkészítésének, az adatok kiértékelésének, a kiértékelési módszereknek és eszközöknek a bemutatása. Advisors/Committee Members: Szabó, Szilárd (advisor).

Subjects/Keywords: LiDAR; Pontfelhő; TLS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kanyok, G. (n.d.). Háromdimenziós kiértékelés lézerszkenneres felmérés alapján . (Thesis). University of Debrecen. Retrieved from http://hdl.handle.net/2437/240691

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kanyok, Gergő. “Háromdimenziós kiértékelés lézerszkenneres felmérés alapján .” Thesis, University of Debrecen. Accessed October 22, 2019. http://hdl.handle.net/2437/240691.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kanyok, Gergő. “Háromdimenziós kiértékelés lézerszkenneres felmérés alapján .” Web. 22 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Kanyok G. Háromdimenziós kiértékelés lézerszkenneres felmérés alapján . [Internet] [Thesis]. University of Debrecen; [cited 2019 Oct 22]. Available from: http://hdl.handle.net/2437/240691.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Kanyok G. Háromdimenziós kiértékelés lézerszkenneres felmérés alapján . [Thesis]. University of Debrecen; Available from: http://hdl.handle.net/2437/240691

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Universidade de Brasília

12. Francisco Marcelo Marques Lima. Development of a system for cryptography transmission of medical images using DICOM protocol.

Degree: 2009, Universidade de Brasília

Interessada nas facilidades oferecidas por um sistema de arquivamento de imagens, a direção do Hospital Universitário de Brasília (HUB) decidiu implementar um servidor PACS que… (more)

Subjects/Keywords: DICOM; PACS; TLS; imagens médicas; PACS; TLS; medical images; ENGENHARIA ELETRICA; segurança; DICOM; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lima, F. M. M. (2009). Development of a system for cryptography transmission of medical images using DICOM protocol. (Thesis). Universidade de Brasília. Retrieved from http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=4786

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lima, Francisco Marcelo Marques. “Development of a system for cryptography transmission of medical images using DICOM protocol.” 2009. Thesis, Universidade de Brasília. Accessed October 22, 2019. http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=4786.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lima, Francisco Marcelo Marques. “Development of a system for cryptography transmission of medical images using DICOM protocol.” 2009. Web. 22 Oct 2019.

Vancouver:

Lima FMM. Development of a system for cryptography transmission of medical images using DICOM protocol. [Internet] [Thesis]. Universidade de Brasília; 2009. [cited 2019 Oct 22]. Available from: http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=4786.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lima FMM. Development of a system for cryptography transmission of medical images using DICOM protocol. [Thesis]. Universidade de Brasília; 2009. Available from: http://bdtd.bce.unb.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=4786

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

13. Šumšal, František. Průběžné testování interoperability knihoven TLS/SSL .

Degree: 2017, Brno University of Technology

 Cílem této práce je implementace systému pro testování Secure Socket Layer (SSL) / Transport Layer Security (TLS) knihoven na podporovaných systémech a jeho využití na… (more)

Subjects/Keywords: testování; interoperabilita; TLS; SSL; průběžná integrace; CI; testing; interoperability; TLS; SSL; continuous integration; CI

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šumšal, F. (2017). Průběžné testování interoperability knihoven TLS/SSL . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/69794

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šumšal, František. “Průběžné testování interoperability knihoven TLS/SSL .” 2017. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/69794.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šumšal, František. “Průběžné testování interoperability knihoven TLS/SSL .” 2017. Web. 22 Oct 2019.

Vancouver:

Šumšal F. Průběžné testování interoperability knihoven TLS/SSL . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/69794.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šumšal F. Průběžné testování interoperability knihoven TLS/SSL . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/69794

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

14. Lysoněk, Milan. Existující útoky na SSL/TLS .

Degree: 2017, Brno University of Technology

 SSL/TLS je moderní kryptografický protokol, který zabezpečuje komunikaci mezi klientem a serverem. Avšak na tento protokol existují útoky, které mohou ohrozit komunikaci buď odposloucháváním nebo… (more)

Subjects/Keywords: SSL; TLS; síťový protokol; útoky; testování; CVE; SSL; TLS; network protocol; attacks; testing; CVE

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lysoněk, M. (2017). Existující útoky na SSL/TLS . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/69655

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lysoněk, Milan. “Existující útoky na SSL/TLS .” 2017. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/69655.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lysoněk, Milan. “Existující útoky na SSL/TLS .” 2017. Web. 22 Oct 2019.

Vancouver:

Lysoněk M. Existující útoky na SSL/TLS . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/69655.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lysoněk M. Existující útoky na SSL/TLS . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/69655

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

15. Pastuszek, Jakub. Extrakce dešifrovaného provozu z SSL spojení .

Degree: 2019, Brno University of Technology

 Cílem této práce je vyvinout aplikaci schopnou dešifrovat zabezpečená spojení a přeposlat dešifrovaná data na jinou stanici v síti pro další analýzu.  Daná aplikace vybízí… (more)

Subjects/Keywords: zrcadlení; SSL/TLS; SSL Proxy; HTTPS; mirror; SSL/TLS; SSL Proxy; HTTPS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pastuszek, J. (2019). Extrakce dešifrovaného provozu z SSL spojení . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/180452

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pastuszek, Jakub. “Extrakce dešifrovaného provozu z SSL spojení .” 2019. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/180452.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pastuszek, Jakub. “Extrakce dešifrovaného provozu z SSL spojení .” 2019. Web. 22 Oct 2019.

Vancouver:

Pastuszek J. Extrakce dešifrovaného provozu z SSL spojení . [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/180452.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pastuszek J. Extrakce dešifrovaného provozu z SSL spojení . [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/180452

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Ghanim, Danny. Utvärdering av reflektorlös vägmätning med totalstation, laserskanner och UAS.

Degree: GIS, 2017, University of Gävle

Denna studie undersöker reflektorlös mätning av vägmitt med totalstation samt skapande av markmodeller av vägar genom terrester laserskanning (TLS) och unmanned aerial system (UAS).… (more)

Subjects/Keywords: reflectorless surveying; laser scanning; TLS; UAS; DTM; roads; reflektorlös mätning; laserskanning; TLS; UAS; markmodeller; vägar; Other Civil Engineering; Annan samhällsbyggnadsteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghanim, D. (2017). Utvärdering av reflektorlös vägmätning med totalstation, laserskanner och UAS. (Thesis). University of Gävle. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-25122

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ghanim, Danny. “Utvärdering av reflektorlös vägmätning med totalstation, laserskanner och UAS.” 2017. Thesis, University of Gävle. Accessed October 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-25122.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ghanim, Danny. “Utvärdering av reflektorlös vägmätning med totalstation, laserskanner och UAS.” 2017. Web. 22 Oct 2019.

Vancouver:

Ghanim D. Utvärdering av reflektorlös vägmätning med totalstation, laserskanner och UAS. [Internet] [Thesis]. University of Gävle; 2017. [cited 2019 Oct 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-25122.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ghanim D. Utvärdering av reflektorlös vägmätning med totalstation, laserskanner och UAS. [Thesis]. University of Gävle; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-25122

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

17. Rosén, Oskar. Encrypted Chat Client : Encrypted communication over XMPP .

Degree: Information and Communication Technology (ICT), 2015, KTH

Every day there are internet users all over the world who sends a total sum of millions of emails and instant messages and a… (more)

Subjects/Keywords: Chat client; Encryption; SSL/TLS; OTR; XMPP; Chattklient; Kryptering; SSL/TLS; OTR; XMPP; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rosén, O. (2015). Encrypted Chat Client : Encrypted communication over XMPP . (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177499

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rosén, Oskar. “Encrypted Chat Client : Encrypted communication over XMPP .” 2015. Thesis, KTH. Accessed October 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177499.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rosén, Oskar. “Encrypted Chat Client : Encrypted communication over XMPP .” 2015. Web. 22 Oct 2019.

Vancouver:

Rosén O. Encrypted Chat Client : Encrypted communication over XMPP . [Internet] [Thesis]. KTH; 2015. [cited 2019 Oct 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177499.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rosén O. Encrypted Chat Client : Encrypted communication over XMPP . [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177499

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Petersson, Jakob. Analysis of Methods for Chained Connections with Mutual Authentication Using TLS.

Degree: Faculty of Science & Engineering, 2015, Linköping UniversityLinköping University

TLS is a vital protocol used to secure communication over networks and it provides an end- to-end encrypted channel between two directly communicating parties.… (more)

Subjects/Keywords: TLS; SSL; mutual authentication; chained connection; chain; proxy chain; TLS extension; extension; certificates; PKI; Computer Engineering; Datorteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Petersson, J. (2015). Analysis of Methods for Chained Connections with Mutual Authentication Using TLS. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119455

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Petersson, Jakob. “Analysis of Methods for Chained Connections with Mutual Authentication Using TLS.” 2015. Thesis, Linköping UniversityLinköping University. Accessed October 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119455.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Petersson, Jakob. “Analysis of Methods for Chained Connections with Mutual Authentication Using TLS.” 2015. Web. 22 Oct 2019.

Vancouver:

Petersson J. Analysis of Methods for Chained Connections with Mutual Authentication Using TLS. [Internet] [Thesis]. Linköping UniversityLinköping University; 2015. [cited 2019 Oct 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119455.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Petersson J. Analysis of Methods for Chained Connections with Mutual Authentication Using TLS. [Thesis]. Linköping UniversityLinköping University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119455

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Jansson, Tom. Utvärdering av terrester laserskanning i framställandet av en 3D-modell : Baserat på underlag från ritning och terrester laserskanning av en fackverksbro.

Degree: Construction, 2018, Dalarna University

De senaste åren har implementeringen av building information modeling(BIM) i anläggningsbranschen trappats upp efter att den svenska regeringen under 2015 beslutat att Trafikverket i… (more)

Subjects/Keywords: Terrestrial laser scanning; TLS; 3D-modeling; BIM; Terrester laserskanning; TLS; 3D-modellering; BIM; Trafikverket; Infrastructure Engineering; Infrastrukturteknik; Construction Management; Byggproduktion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jansson, T. (2018). Utvärdering av terrester laserskanning i framställandet av en 3D-modell : Baserat på underlag från ritning och terrester laserskanning av en fackverksbro. (Thesis). Dalarna University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:du-27852

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jansson, Tom. “Utvärdering av terrester laserskanning i framställandet av en 3D-modell : Baserat på underlag från ritning och terrester laserskanning av en fackverksbro.” 2018. Thesis, Dalarna University. Accessed October 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:du-27852.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jansson, Tom. “Utvärdering av terrester laserskanning i framställandet av en 3D-modell : Baserat på underlag från ritning och terrester laserskanning av en fackverksbro.” 2018. Web. 22 Oct 2019.

Vancouver:

Jansson T. Utvärdering av terrester laserskanning i framställandet av en 3D-modell : Baserat på underlag från ritning och terrester laserskanning av en fackverksbro. [Internet] [Thesis]. Dalarna University; 2018. [cited 2019 Oct 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:du-27852.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jansson T. Utvärdering av terrester laserskanning i framställandet av en 3D-modell : Baserat på underlag från ritning och terrester laserskanning av en fackverksbro. [Thesis]. Dalarna University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:du-27852

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

20. Li, Jiatong. TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX.

Degree: CoS, 2019, KTH

Nowadays cloud computing systems handle large amounts of data and process this data across different systems. It is essential to considering data security vulnerabilities… (more)

Subjects/Keywords: Intel SGX; Trusted Execution Environment; TLS libraries; Intel SGX; Trusted Execution Environment; TLS-bibliotek; Communication Systems; Kommunikationssystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, J. (2019). TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-241245

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Jiatong. “TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX.” 2019. Thesis, KTH. Accessed October 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-241245.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Jiatong. “TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX.” 2019. Web. 22 Oct 2019.

Vancouver:

Li J. TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX. [Internet] [Thesis]. KTH; 2019. [cited 2019 Oct 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-241245.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li J. TLS Library for Isolated Enclaves : Optimizing the performance of TLS libraries for SGX. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-241245

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Salvador, Ana Raquel Barreiros. Liderança tóxica e liderança de empoderamento: relações com a motivação para o trabalho.

Degree: 2018, Universidade de Évora

 O presente trabalho tem como objetivo verificar a associação entre dois modelos opostos de liderança, a tóxica e a de empoderamento, e as diversas dimensões… (more)

Subjects/Keywords: Liderança de empoderamento; Liderança tóxica; Motivação para o trabalho; ELQ; TLS; MWMS; Empowerment leadership; Toxic leadership; Work motivation; ELQ; TLS; MWMS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Salvador, A. R. B. (2018). Liderança tóxica e liderança de empoderamento: relações com a motivação para o trabalho. (Thesis). Universidade de Évora. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:dspace.uevora.pt:10174/23427

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Salvador, Ana Raquel Barreiros. “Liderança tóxica e liderança de empoderamento: relações com a motivação para o trabalho.” 2018. Thesis, Universidade de Évora. Accessed October 22, 2019. https://www.rcaap.pt/detail.jsp?id=oai:dspace.uevora.pt:10174/23427.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Salvador, Ana Raquel Barreiros. “Liderança tóxica e liderança de empoderamento: relações com a motivação para o trabalho.” 2018. Web. 22 Oct 2019.

Vancouver:

Salvador ARB. Liderança tóxica e liderança de empoderamento: relações com a motivação para o trabalho. [Internet] [Thesis]. Universidade de Évora; 2018. [cited 2019 Oct 22]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:dspace.uevora.pt:10174/23427.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Salvador ARB. Liderança tóxica e liderança de empoderamento: relações com a motivação para o trabalho. [Thesis]. Universidade de Évora; 2018. Available from: https://www.rcaap.pt/detail.jsp?id=oai:dspace.uevora.pt:10174/23427

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

22. Dávidík, Roland. Program pro detekci útoků na TLS protokol .

Degree: 2018, Brno University of Technology

 Táto bakalárska práca popisuje princíp útokov HeartBleed, POODLE a BEAST na TLS protokol. Následne sú tieto útoky zrealizované v experimentálnych pracoviskách. Ďalej táto práca popisuje… (more)

Subjects/Keywords: TLS; SSL; HeartBleed; POODLE; BEAST; program; útok; video; CBC; detekcia; TLS; SSL; HeartBleed; POODLE; BEAST; program; attack; video; CBC; detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dávidík, R. (2018). Program pro detekci útoků na TLS protokol . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/81986

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dávidík, Roland. “Program pro detekci útoků na TLS protokol .” 2018. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/81986.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dávidík, Roland. “Program pro detekci útoků na TLS protokol .” 2018. Web. 22 Oct 2019.

Vancouver:

Dávidík R. Program pro detekci útoků na TLS protokol . [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/81986.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dávidík R. Program pro detekci útoků na TLS protokol . [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/81986

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

23. Hutar, Jan. Detekce a analýza přenosů využívajících protokoly SSL/TLS .

Degree: 2017, Brno University of Technology

 Diplomová práce se zabývá detekcí a analýzou zabezpečených spojení elektronické ko- munikace prostřednictvím protokolů SSL/TLS. V práci je prostudována problematika SSL/TLS protokolů. Následně byla provedena… (more)

Subjects/Keywords: SSL; TLS; X.509; DPI; Metadata; SMTP; POP3; IMAP; STARTTLS; SSL; TLS; X.509; DPI; Metadata; SMTP; POP3; IMAP; STARTTLS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hutar, J. (2017). Detekce a analýza přenosů využívajících protokoly SSL/TLS . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/65672

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hutar, Jan. “Detekce a analýza přenosů využívajících protokoly SSL/TLS .” 2017. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/65672.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hutar, Jan. “Detekce a analýza přenosů využívajících protokoly SSL/TLS .” 2017. Web. 22 Oct 2019.

Vancouver:

Hutar J. Detekce a analýza přenosů využívajících protokoly SSL/TLS . [Internet] [Thesis]. Brno University of Technology; 2017. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/65672.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hutar J. Detekce a analýza přenosů využívajících protokoly SSL/TLS . [Thesis]. Brno University of Technology; 2017. Available from: http://hdl.handle.net/11012/65672

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

24. Pokorný, Fridolín. Optimalizace výkonu VPN v Linuxu .

Degree: 2016, Brno University of Technology

 Tato práce se zabývá analýzou stávajících a aktivních VPN řešení,  jejich výkonu a slabých stránek. Výsledkem práce je jaderný modul pro Linux, který implementuje datový… (more)

Subjects/Keywords: VPN; Linux; optimalizace; operační systém; TLS; DTLS; sítě; bezpečnost; VPN; Linux; optimization; operating system; TLS; DTLS; networking; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pokorný, F. (2016). Optimalizace výkonu VPN v Linuxu . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/61908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pokorný, Fridolín. “Optimalizace výkonu VPN v Linuxu .” 2016. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/61908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pokorný, Fridolín. “Optimalizace výkonu VPN v Linuxu .” 2016. Web. 22 Oct 2019.

Vancouver:

Pokorný F. Optimalizace výkonu VPN v Linuxu . [Internet] [Thesis]. Brno University of Technology; 2016. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/61908.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pokorný F. Optimalizace výkonu VPN v Linuxu . [Thesis]. Brno University of Technology; 2016. Available from: http://hdl.handle.net/11012/61908

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

25. Marušic, Marek. Automatizace MitM útoku pro dešifrování SSL/TLS .

Degree: 2016, Brno University of Technology

 Protokoly SSL/TLS sú používané pre šifráciu sieťovéhej prevádzky. Poskytujú bezpečnú komunikáciu medzi klientmi a servermi. Komunikácia môže byť odpočúvaná pomocou MitM útoku. Táto práca je… (more)

Subjects/Keywords: SSL; TLS; dešifrácia; MitM; Man-in-the-Middle; útok; SSL; TLS; decryption; MitM; Man-in-the-Middle; attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marušic, M. (2016). Automatizace MitM útoku pro dešifrování SSL/TLS . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/62154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Marušic, Marek. “Automatizace MitM útoku pro dešifrování SSL/TLS .” 2016. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/62154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Marušic, Marek. “Automatizace MitM útoku pro dešifrování SSL/TLS .” 2016. Web. 22 Oct 2019.

Vancouver:

Marušic M. Automatizace MitM útoku pro dešifrování SSL/TLS . [Internet] [Thesis]. Brno University of Technology; 2016. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/62154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Marušic M. Automatizace MitM útoku pro dešifrování SSL/TLS . [Thesis]. Brno University of Technology; 2016. Available from: http://hdl.handle.net/11012/62154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

26. Dvonč, Tomáš. Analýza zabezpečení webových serverů a domén .

Degree: 2018, Brno University of Technology

 Cieľom bakalárskej práce bola analýza zabezpečenia webových a e-mailových serverov. Práca sa skladá z troch častí. V prvej časti budú popísané komunikačné protokoly a vysvetlí… (more)

Subjects/Keywords: HTTP; HTTPS; SSL; TLS protokol; Linux; Golang; Docker; HTTP; HTTPS; SSL; TLS protocol; Linux; Golang; Docker

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dvonč, T. (2018). Analýza zabezpečení webových serverů a domén . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/82398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dvonč, Tomáš. “Analýza zabezpečení webových serverů a domén .” 2018. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/82398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dvonč, Tomáš. “Analýza zabezpečení webových serverů a domén .” 2018. Web. 22 Oct 2019.

Vancouver:

Dvonč T. Analýza zabezpečení webových serverů a domén . [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/82398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dvonč T. Analýza zabezpečení webových serverů a domén . [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/82398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

27. Kortus, Jiří. Laboratorní úloha Virtuální sítě typu OpenVPN .

Degree: 2012, Brno University of Technology

 Tato práce v úvodu popisuje principy virtuálních privátních sítí (VPN) a stručně zmiňuje hlavní protokoly a přístupy pro jejich realizaci. Následně se podrobněji zaměřuje na… (more)

Subjects/Keywords: VPN virtuální privátní síť OpenVPN laboratorní úloha SSL TLS; VPN virtual private network OpenVPN lab laboratory exercise SSL TLS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kortus, J. (2012). Laboratorní úloha Virtuální sítě typu OpenVPN . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/10538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kortus, Jiří. “Laboratorní úloha Virtuální sítě typu OpenVPN .” 2012. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/10538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kortus, Jiří. “Laboratorní úloha Virtuální sítě typu OpenVPN .” 2012. Web. 22 Oct 2019.

Vancouver:

Kortus J. Laboratorní úloha Virtuální sítě typu OpenVPN . [Internet] [Thesis]. Brno University of Technology; 2012. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/10538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kortus J. Laboratorní úloha Virtuální sítě typu OpenVPN . [Thesis]. Brno University of Technology; 2012. Available from: http://hdl.handle.net/11012/10538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

28. Slivka, Miroslav. Rekonstrukce webmailového provozu .

Degree: 2015, Brno University of Technology

 Webmailové aplikace jsou dnes mezi lidmi velmi populární díky velké dostupnosti Internetu. Kromě běžného použití mohou být díky šifrovanému spojení využity ale i na nekalé… (more)

Subjects/Keywords: Netfox.Framework; e-mail; webmail; detekce webmailů; dešifrování SSL/TLS; Netfox.Framework; e-mail; webmail; webmail detection; deciphering SSL/TLS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Slivka, M. (2015). Rekonstrukce webmailového provozu . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/64080

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Slivka, Miroslav. “Rekonstrukce webmailového provozu .” 2015. Thesis, Brno University of Technology. Accessed October 22, 2019. http://hdl.handle.net/11012/64080.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Slivka, Miroslav. “Rekonstrukce webmailového provozu .” 2015. Web. 22 Oct 2019.

Vancouver:

Slivka M. Rekonstrukce webmailového provozu . [Internet] [Thesis]. Brno University of Technology; 2015. [cited 2019 Oct 22]. Available from: http://hdl.handle.net/11012/64080.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Slivka M. Rekonstrukce webmailového provozu . [Thesis]. Brno University of Technology; 2015. Available from: http://hdl.handle.net/11012/64080

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

29. Lee, Songho. Current practices for DNS Privacy : Protection towards pervasive surveillance.

Degree: computer science and media technology (CM), 2019, Linnaeus University

Current usage of the DNS system is a significant loophole of Internet users' privacy, as all queries and answers for resolving web address are… (more)

Subjects/Keywords: DNS; DNS-over-HTTPS; DNS-over-TLS; DNS Privacy; DNS; DNS-över-HTTPS; DNS-över-TLS; DNS Sekretess; Computer Systems; Datorsystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, S. (2019). Current practices for DNS Privacy : Protection towards pervasive surveillance. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85621

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lee, Songho. “Current practices for DNS Privacy : Protection towards pervasive surveillance.” 2019. Thesis, Linnaeus University. Accessed October 22, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85621.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lee, Songho. “Current practices for DNS Privacy : Protection towards pervasive surveillance.” 2019. Web. 22 Oct 2019.

Vancouver:

Lee S. Current practices for DNS Privacy : Protection towards pervasive surveillance. [Internet] [Thesis]. Linnaeus University; 2019. [cited 2019 Oct 22]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85621.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lee S. Current practices for DNS Privacy : Protection towards pervasive surveillance. [Thesis]. Linnaeus University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85621

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

30. Richard, Benjamin. Étude des protocoles d'authentification et de dérivation de clefs en 3 parties : Authenticated key exchange protocols in three parties.

Degree: Docteur es, Informatique, 2017, Rennes 1

Dans cette thèse, nous nous sommes intéressés à la sécurité des protocoles d’authentification et de dérivations de clefs dans le cas où une troisième entité… (more)

Subjects/Keywords: Sécurité; Vie privée; Protocoles AKA; Réseaux Mobiles; Keyless SSL; Tls; Security; Privacy; AKA Protocols; Mobile Networks; Keyless SSL; Tls

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Richard, B. (2017). Étude des protocoles d'authentification et de dérivation de clefs en 3 parties : Authenticated key exchange protocols in three parties. (Doctoral Dissertation). Rennes 1. Retrieved from http://www.theses.fr/2017REN1S037

Chicago Manual of Style (16th Edition):

Richard, Benjamin. “Étude des protocoles d'authentification et de dérivation de clefs en 3 parties : Authenticated key exchange protocols in three parties.” 2017. Doctoral Dissertation, Rennes 1. Accessed October 22, 2019. http://www.theses.fr/2017REN1S037.

MLA Handbook (7th Edition):

Richard, Benjamin. “Étude des protocoles d'authentification et de dérivation de clefs en 3 parties : Authenticated key exchange protocols in three parties.” 2017. Web. 22 Oct 2019.

Vancouver:

Richard B. Étude des protocoles d'authentification et de dérivation de clefs en 3 parties : Authenticated key exchange protocols in three parties. [Internet] [Doctoral dissertation]. Rennes 1; 2017. [cited 2019 Oct 22]. Available from: http://www.theses.fr/2017REN1S037.

Council of Science Editors:

Richard B. Étude des protocoles d'authentification et de dérivation de clefs en 3 parties : Authenticated key exchange protocols in three parties. [Doctoral Dissertation]. Rennes 1; 2017. Available from: http://www.theses.fr/2017REN1S037

[1] [2] [3] [4] [5] [6]

.