Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(and the asymmetric algorithm of Diffie Hellman over Elliptic Curves). Showing records 1 – 30 of 713522 total matches.

[1] [2] [3] [4] [5] … [23785]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters


Brno University of Technology

1. Mravec, Roman. Elektronické doklady: Electronic ID Cards.

Degree: 2019, Brno University of Technology

 This master thesis deals with an implementation of Diffie-Hellman protocol on smart card which is based on MULTOS OS. Defines the smart cards based on… (more)

Subjects/Keywords: Elektronické doklady; Smart karty; Asymetrická kryptografie; Eliptické křivky; Diffie-Hellman; MULTOS; SmartDeck; Elecronic ID cards; smart cards; Asymmetric cryptography; Elliptic curves; Diffie-Hellman; MULTOS; SmartDeck

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mravec, R. (2019). Elektronické doklady: Electronic ID Cards. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/65676

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mravec, Roman. “Elektronické doklady: Electronic ID Cards.” 2019. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/65676.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mravec, Roman. “Elektronické doklady: Electronic ID Cards.” 2019. Web. 20 Jan 2021.

Vancouver:

Mravec R. Elektronické doklady: Electronic ID Cards. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/65676.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mravec R. Elektronické doklady: Electronic ID Cards. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/65676

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. Nakamura, Dionathan. Segurança do bit menos significativo no RSA e em curvas elípticas.

Degree: Mestrado, Ciência da Computação, 2011, University of São Paulo

Sistemas criptográficos como o RSA e o Diffie-Hellman sobre Curvas Elípticas (DHCE) têm fundamento em problemas computacionais considerados difíceis, por exemplo, o problema do logaritmo… (more)

Subjects/Keywords: Criptografia; Cryptography; Curvas Elípticas; Diffie-Hellman; Diffie-Hellman; Elliptic Curves.; RSA; RSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nakamura, D. (2011). Segurança do bit menos significativo no RSA e em curvas elípticas. (Masters Thesis). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/45/45134/tde-14032012-213011/ ;

Chicago Manual of Style (16th Edition):

Nakamura, Dionathan. “Segurança do bit menos significativo no RSA e em curvas elípticas.” 2011. Masters Thesis, University of São Paulo. Accessed January 20, 2021. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-14032012-213011/ ;.

MLA Handbook (7th Edition):

Nakamura, Dionathan. “Segurança do bit menos significativo no RSA e em curvas elípticas.” 2011. Web. 20 Jan 2021.

Vancouver:

Nakamura D. Segurança do bit menos significativo no RSA e em curvas elípticas. [Internet] [Masters thesis]. University of São Paulo; 2011. [cited 2021 Jan 20]. Available from: http://www.teses.usp.br/teses/disponiveis/45/45134/tde-14032012-213011/ ;.

Council of Science Editors:

Nakamura D. Segurança do bit menos significativo no RSA e em curvas elípticas. [Masters Thesis]. University of São Paulo; 2011. Available from: http://www.teses.usp.br/teses/disponiveis/45/45134/tde-14032012-213011/ ;


Anna University

3. Subashri T. Studies on security algorithms for VOIP network;.

Degree: Studies on security algorithms for VOIP network, 2015, Anna University

Voice over Internet Protocol VoIP deals with real time newlinetransmission of voice packets over internet protocol Security services like newlineconfidentiality message integrity and authentication are… (more)

Subjects/Keywords: Advanced Encryption Standard; Diffie Hellman; Elliptic Curve Diffie Hellman; Voice over Internet Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

T, S. (2015). Studies on security algorithms for VOIP network;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/39431

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

T, Subashri. “Studies on security algorithms for VOIP network;.” 2015. Thesis, Anna University. Accessed January 20, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/39431.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

T, Subashri. “Studies on security algorithms for VOIP network;.” 2015. Web. 20 Jan 2021.

Vancouver:

T S. Studies on security algorithms for VOIP network;. [Internet] [Thesis]. Anna University; 2015. [cited 2021 Jan 20]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/39431.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

T S. Studies on security algorithms for VOIP network;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/39431

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Stellenbosch University

4. Louw, Gerard Jacques. Elliptic curve cryptography.

Degree: MSc, Mathematical Sciences, 2016, Stellenbosch University

ENGLISH ABSTRACT : In this thesis we present a selection of Diffie-Hellman cryptosystems, which were classically formulated using the multiplicative group of a finite field,… (more)

Subjects/Keywords: Diffie-Hellman cryptosystems; UCTD; Curves, Elliptic; Cryptography; Discrete logarithm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Louw, G. J. (2016). Elliptic curve cryptography. (Masters Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/100323

Chicago Manual of Style (16th Edition):

Louw, Gerard Jacques. “Elliptic curve cryptography.” 2016. Masters Thesis, Stellenbosch University. Accessed January 20, 2021. http://hdl.handle.net/10019.1/100323.

MLA Handbook (7th Edition):

Louw, Gerard Jacques. “Elliptic curve cryptography.” 2016. Web. 20 Jan 2021.

Vancouver:

Louw GJ. Elliptic curve cryptography. [Internet] [Masters thesis]. Stellenbosch University; 2016. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/10019.1/100323.

Council of Science Editors:

Louw GJ. Elliptic curve cryptography. [Masters Thesis]. Stellenbosch University; 2016. Available from: http://hdl.handle.net/10019.1/100323


Brno University of Technology

5. Člupek, Vlastimil. Kryptografický protokol výměny klíčů Diffie-Hellman: Diffie-Hellman key exchange protocol.

Degree: 2019, Brno University of Technology

 In this bachelor's thesis there is explained principle of cryptography, encryption methods and primarily cryptographic protocol key exchange Diffie-Hellman. There is described key exchange process… (more)

Subjects/Keywords: Kryptografie; protokol Diffie-Hellman (DH); eliptická křivka; protokol Elliptic Curve Diffie-Hellman (ECDH); útok „Man in the middle“; kompatibilita mezi protokoly DH a ECDH.; Cryptography; protocol Diffie-Hellman (DH); elliptic curve; protocol Elliptic Curve Diffie-Hellman (ECDH); attack "Man in the middle"; compatibility between the protocols DH and ECDH.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Člupek, V. (2019). Kryptografický protokol výměny klíčů Diffie-Hellman: Diffie-Hellman key exchange protocol. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/6539

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Člupek, Vlastimil. “Kryptografický protokol výměny klíčů Diffie-Hellman: Diffie-Hellman key exchange protocol.” 2019. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/6539.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Člupek, Vlastimil. “Kryptografický protokol výměny klíčů Diffie-Hellman: Diffie-Hellman key exchange protocol.” 2019. Web. 20 Jan 2021.

Vancouver:

Člupek V. Kryptografický protokol výměny klíčů Diffie-Hellman: Diffie-Hellman key exchange protocol. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/6539.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Člupek V. Kryptografický protokol výměny klíčů Diffie-Hellman: Diffie-Hellman key exchange protocol. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/6539

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

6. Felding, Eric. Simuleringar av elliptiska kurvor för elliptisk kryptografi.

Degree: Mathematics and Applied Mathematics, 2019, Linköping University

This thesis describes the theory behind elliptic-curve Diffie-Hellman key exchanges. All the way from the definition of a group until how the operator over(more)

Subjects/Keywords: Diffie-Hellman; elliptic curves; cryptography; ECDH; ECC; Diffie-Hellman; elliptiska kurvor; kryptografi; ECDH; ECC; Mathematics; Matematik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Felding, E. (2019). Simuleringar av elliptiska kurvor för elliptisk kryptografi. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Felding, Eric. “Simuleringar av elliptiska kurvor för elliptisk kryptografi.” 2019. Thesis, Linköping University. Accessed January 20, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Felding, Eric. “Simuleringar av elliptiska kurvor för elliptisk kryptografi.” 2019. Web. 20 Jan 2021.

Vancouver:

Felding E. Simuleringar av elliptiska kurvor för elliptisk kryptografi. [Internet] [Thesis]. Linköping University; 2019. [cited 2021 Jan 20]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158133.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Felding E. Simuleringar av elliptiska kurvor för elliptisk kryptografi. [Thesis]. Linköping University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158133

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

7. Fujdiak, Radek. Kryptografický protokol s veřejným klíčem: Cryptography protocol with public key.

Degree: 2019, Brno University of Technology

 The Master thesis is an introduction to cryptology. The Thesis describe cryptosystems and selects one ideal cypher for low-power microcontroler. In thesis provides manual for… (more)

Subjects/Keywords: Kryptologie; Kryptografie; Symetrický kryptosystém; Advanced Encryption Standard; Asymetrický kryptosystém; Diffie-Hellman; Eliptická křivka; Diffie-Hellman a eliptické křivky; MSP430; náhodný generátor čísel; Cryptology; Cryptography; Symmetric cypher; Advanced Encryption Standard; Asymmetric cypher; Diffie-Hellman; Elliptic curve; Elliptic curve Diffie-Hellman; MSP430; random number generator

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fujdiak, R. (2019). Kryptografický protokol s veřejným klíčem: Cryptography protocol with public key. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/26527

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fujdiak, Radek. “Kryptografický protokol s veřejným klíčem: Cryptography protocol with public key.” 2019. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/26527.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fujdiak, Radek. “Kryptografický protokol s veřejným klíčem: Cryptography protocol with public key.” 2019. Web. 20 Jan 2021.

Vancouver:

Fujdiak R. Kryptografický protokol s veřejným klíčem: Cryptography protocol with public key. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/26527.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fujdiak R. Kryptografický protokol s veřejným klíčem: Cryptography protocol with public key. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/26527

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

8. Idrees, Zunera. Elliptic Curves Cryptography.

Degree: Physics and Mathematics, 2012, Linnaeus University

  In the thesis we study the elliptic curves and its use in cryptography. Elliptic curvesencompasses a vast area of mathematics. Elliptic curves have basics… (more)

Subjects/Keywords: Group Theory and Number Theory; Elliptic Curves; Elliptic Curves over Finite Fields; Applications of Elliptic Curves.; Mathematics; Matematik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Idrees, Z. (2012). Elliptic Curves Cryptography. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Idrees, Zunera. “Elliptic Curves Cryptography.” 2012. Thesis, Linnaeus University. Accessed January 20, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Idrees, Zunera. “Elliptic Curves Cryptography.” 2012. Web. 20 Jan 2021.

Vancouver:

Idrees Z. Elliptic Curves Cryptography. [Internet] [Thesis]. Linnaeus University; 2012. [cited 2021 Jan 20]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Idrees Z. Elliptic Curves Cryptography. [Thesis]. Linnaeus University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17544

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

9. Fujdiak, Radek. Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy.

Degree: 2018, Brno University of Technology

Telemetry system, Optimisation, Sensoric networks, Smart Grid, Internet of Things, Sensors, Information security, Cryptography, Cryptography algorithms, Cryptosystem, Confidentiality, Integrity, Authentication, Data freshness, Non-Repudiation. Advisors/Committee Members: Mišurec, Jiří (advisor), Orgoň, Miloš (referee), Pitner,, Tomáš (referee).

Subjects/Keywords: Dizertační práce se zabývá výzkumem v oblasti optimalizace telemetrických systémů v energetice z pohledu informační bezpečnosti. Práce pojednává o současných problémech informační bezpečnosti; její definici a i o metodách; které vedou k naplnění bezpečnostních principů; a soustředí se zejména na oblast; kde jsou využívány zařízení s omezenými zdroji To z toho důvodu; že zařízení s limitovanými zdroji; tj. operační paměť; omezený přístup k elektrické energii; výkon; aj.; představují bezpečnostní rizika; která mohou ovlivňovat následně celou energetickou infrastrukturu v případě nasazení technologií v konceptu inteligentních sítí. Jsou přiblíženy dnešní vědecké výzvy v této oblasti; objasněna terminologie i legislativa; která je pro tuto oblast také velice zásadní. Hlavní část dizertační práce je následně věnována výzkumu vlastního hybridního řešení; kryptosystému. Jedná se o řešení; které nenaplňuje pouze jeden bezpečnostní princip (např. pouze autentičnost); nýbrž o řešení; které nabízí všechny požadované principy informační bezpečnosti v energetice. Je provedena hloubková analýza dnešních řešení; které jsou následně evaluovány vlastními měřeními i pomocí současné aktuální literatury. Následně je proveden návrh kombinací symetrických a asymetrických kryptografických algoritmů; tak aby byla zaručena efektivita výsledného systému; ale také zachována jeho komplexnost systému. Jedná se o kombinaci symetrických blokových algoritmů elektronické kódové knihy; zajišťující autentizaci a integritu pomocí náhodných klíčů; řetězení šifrovaného textu zajišťující důvěrnost; společně s algoritmem Diffieho-Hellmana nad eliptickými křivkami zajišťující bezpečnou distribuci a výměnu symetrických tajných klíčů. V neposlední řadě je přiblížen provedený vlastní vývoj a optimalizace hybridního kryptosystému. Je představeno vlastní řešení pro reprezentaci velkých čísel a modulární algebru v zařízení s limitovanými zdroji; které je ověřeno experimentálními měřeními. Dále je rozebrán vlastní návrh; validace a optimalizace řešení náhodných hardwarových generátorů (založených na efektivním principu kvantizační chyby a protichůdných oscilátorů). Je také řešena navržená část symetrické kryptografie; kde je využito dvou dostupných knihoven; které jsou následně znatelně optimalizovány. V neposlední řadě je představen provedený rozsáhlý výzkum kryptografie eliptických křivek a možností distribuce symetrického klíče. Jsou implementovány algoritmy pro výpočty s body eliptických křivek nad polem s prvočíselným řádem i nad polem řádu 2. Realizace pak zahrnovala více než 50 eliptických křivek různých standardů; kde největším úspěchem jsou křivky nad polem prvočísel o řádu p = 256. Tyto křivky v době řešení nebyly na takto hardwarových platformách řešeny. Nakonec jsou představeny originální výsledky výzkumu; který se zabýval vhodnou volbou křivek a studií jejich doménových parametrů z pohledu vztahu velikosti k rychlosti operací nad křivkou.; The dissertation thesis focuses on research in the optimisation of telemetry systems in energy from the perspective of information security. The thesis deals with nowadays challenges in information security; its definition as well as its methods. The main focus is on the area; where devices with limited resources such as memory or computational power are used. These devices pose security risks that may affect the entire smart grid infrastructure. Nowadays research challenges terminology and legislative; which is crucial in the defined area; are brought closer. The main part of this thesis is devoted to the research of the author’s own hybrid solution – the hybrid cryptosystem. The solution fulfils all necessary principles of information security – authenticity; confidentiality; integrity and data freshness. An analysis of today’s solutions is provided together with a complex evaluation based on own experimental measurements and available literature sources. Subsequently; a combination of symmetric and asymmetric cryptography algorithms is designed that provides both high efficiency and complexity. It is a combination of the symmetric block cyphers Electronic Code Book; which provides authenticity and integrity by using random keys; Cipher Block Chaining; which provided confidentiality; and the asymmetric algorithm of Diffie-Hellman over Elliptic Curves; which provides key agreement scheme over an unsecured channel. Further; the development and optimisation of the hybrid cryptosystem are brought in light. The proprietary solution of large number representation and modular algebra in a device with limited resources is presented and validated via own experimental measurements. Moreover; the own design is analysed and the two proposed hardware generators (based on efficient methods of quantization error and opposing oscillators) are evaluated and optimised. Additionally; the symmetric part of the cryptosystem is also investigated; where two main solutions are highly optimised. Last but not least; deep research on the cryptography of elliptic curves and the key distribution scheme is presented. Two main curve types are dealt with – over a finite field and over a field of characteristic two. The implementation included more than 50 elliptic curves of different standards. The implementation of the curves of order p = 256 has the highest impact. These curves were not addressed on such devices at the time of solution. Finally; the original research results of possible speed optimisation via using special elliptic curves are introduced. The relationship between curve domain parameters and point computational efficiency is studied. This last part brings also promising results for the field of effective cryptographic algorithm – the lightweight cryptography.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fujdiak, R. (2018). Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/69305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fujdiak, Radek. “Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy.” 2018. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/69305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fujdiak, Radek. “Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy.” 2018. Web. 20 Jan 2021.

Vancouver:

Fujdiak R. Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/69305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fujdiak R. Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/69305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Kammerer, Jean-Gabriel. Analyse de nouvelles primitives cryptographiques pour les schémas Diffie-Hellman : Analysis of new cryptographic primitives for Diffie-Hellman schemes.

Degree: Docteur es, Mathématiques fondamentales et applications, 2013, Rennes 1

L'objet de cette thèse est l'étude de diverses primitives cryptographiques utiles dans des protocoles Diffie-Hellman. Nous étudions tout d'abord les protocoles Diffie-Helmman sur des structures… (more)

Subjects/Keywords: Cryptographie; Cryptanalyse; Polynôme tordu; Courbes elliptiques; Cubiques; Courbes algébriques; Courbes hyperelliptiques; Hachage; Encodage; Cryptographic primitives; Diffie-Hellman protocols; Algebraic curves -toward elliptic -elliptic curves; Algebra problem; Skew polynomials; Polynomial complexity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kammerer, J. (2013). Analyse de nouvelles primitives cryptographiques pour les schémas Diffie-Hellman : Analysis of new cryptographic primitives for Diffie-Hellman schemes. (Doctoral Dissertation). Rennes 1. Retrieved from http://www.theses.fr/2013REN1S035

Chicago Manual of Style (16th Edition):

Kammerer, Jean-Gabriel. “Analyse de nouvelles primitives cryptographiques pour les schémas Diffie-Hellman : Analysis of new cryptographic primitives for Diffie-Hellman schemes.” 2013. Doctoral Dissertation, Rennes 1. Accessed January 20, 2021. http://www.theses.fr/2013REN1S035.

MLA Handbook (7th Edition):

Kammerer, Jean-Gabriel. “Analyse de nouvelles primitives cryptographiques pour les schémas Diffie-Hellman : Analysis of new cryptographic primitives for Diffie-Hellman schemes.” 2013. Web. 20 Jan 2021.

Vancouver:

Kammerer J. Analyse de nouvelles primitives cryptographiques pour les schémas Diffie-Hellman : Analysis of new cryptographic primitives for Diffie-Hellman schemes. [Internet] [Doctoral dissertation]. Rennes 1; 2013. [cited 2021 Jan 20]. Available from: http://www.theses.fr/2013REN1S035.

Council of Science Editors:

Kammerer J. Analyse de nouvelles primitives cryptographiques pour les schémas Diffie-Hellman : Analysis of new cryptographic primitives for Diffie-Hellman schemes. [Doctoral Dissertation]. Rennes 1; 2013. Available from: http://www.theses.fr/2013REN1S035

11. Valenta, Luke Taylor. Measuring And Securing Cryptographic Deployments.

Degree: 2019, University of Pennsylvania

 This dissertation examines security vulnerabilities that arise due to communication failures and incentive mismatches along the path from cryptographic algorithm design to eventual deployment. I… (more)

Subjects/Keywords: Cryptography; Diffie-Hellman; Elliptic curves; Internet scanning; TLS; Computer Sciences

…a diverse set of decisions on how to handle Diffie-Hellman exponents, likely due to the… …October 2016, we found that of the 12,835,911 hosts that accepted Diffie-Hellman key exchange… …most common supported curves lists along with the user agents and operating systems of the… …impact of Diffie-Hellman attacks—We use Internetwide scanning to estimate the number of real… …sieve factoring algorithm consists of several main stages. Sieving and linear algebra are the… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Valenta, L. T. (2019). Measuring And Securing Cryptographic Deployments. (Thesis). University of Pennsylvania. Retrieved from https://repository.upenn.edu/edissertations/3507

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Valenta, Luke Taylor. “Measuring And Securing Cryptographic Deployments.” 2019. Thesis, University of Pennsylvania. Accessed January 20, 2021. https://repository.upenn.edu/edissertations/3507.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Valenta, Luke Taylor. “Measuring And Securing Cryptographic Deployments.” 2019. Web. 20 Jan 2021.

Vancouver:

Valenta LT. Measuring And Securing Cryptographic Deployments. [Internet] [Thesis]. University of Pennsylvania; 2019. [cited 2021 Jan 20]. Available from: https://repository.upenn.edu/edissertations/3507.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Valenta LT. Measuring And Securing Cryptographic Deployments. [Thesis]. University of Pennsylvania; 2019. Available from: https://repository.upenn.edu/edissertations/3507

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

12. Jakubíček, Michal. Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power.

Degree: 2019, Brno University of Technology

 Bachelor thesis in the first chapter deals with the concept of quality of electric power and its parameters. The next chapter is focused on systems… (more)

Subjects/Keywords: Kvalita elektrické energie; kryptografie; asymetrický kryptosystém; Diffie–Hellmanův protokol; BigDigits; GMP; OpenSSL.; Quality of electric power; cryptography; asymmetric cryptosystem; Diffie–Hellman protocol; BigDigits; GMP; OpenSSL.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jakubíček, M. (2019). Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/71574

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jakubíček, Michal. “Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power.” 2019. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/71574.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jakubíček, Michal. “Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power.” 2019. Web. 20 Jan 2021.

Vancouver:

Jakubíček M. Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/71574.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jakubíček M. Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/71574

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

13. Krontiris, Alexandros. Evaluation of Certificate Enrollment over Application Layer Security.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

This thesis analyzes Application Layer security protocols for certificate enrollment and management. EDHOC, Ephemeral Diffie-HellmanOver COSE, is a recently developed key exchange protocol whichis… (more)

Subjects/Keywords: Certificate Enrollment/Management; application layer security; Ephemeral Diffie-Hellman Over COSE (EDHOC); key exchange protocol.; Certifikat inskrivning/förvaltning; applikationslager säkerhet; Ephemeral Diffie-Hellman Over COSE (EDHOC); nyckelutbytesprotokoll.; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krontiris, A. (2018). Evaluation of Certificate Enrollment over Application Layer Security. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krontiris, Alexandros. “Evaluation of Certificate Enrollment over Application Layer Security.” 2018. Thesis, KTH. Accessed January 20, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krontiris, Alexandros. “Evaluation of Certificate Enrollment over Application Layer Security.” 2018. Web. 20 Jan 2021.

Vancouver:

Krontiris A. Evaluation of Certificate Enrollment over Application Layer Security. [Internet] [Thesis]. KTH; 2018. [cited 2021 Jan 20]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krontiris A. Evaluation of Certificate Enrollment over Application Layer Security. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Indian Institute of Science

14. Das, Saptarsi. A Polymorphic Finite Field Multiplier.

Degree: MSc Engg, Faculty of Engineering, 2013, Indian Institute of Science

 Cryptography algorithms like the Advanced Encryption Standard, Elliptic Curve Cryptography algorithms etc are designed using algebraic properties of finite fields. Thus performance of these algorithms… (more)

Subjects/Keywords: Mobile Communication - Security; Poymorphic Multiplier; Finite Field Arithmetic; Cryptography; Elliptic Curve Cryptography (ECC); Public Key Cryptography Algorithms; Elliptic Curve Diffie-Hellman Algorithm (ECDHA); Elliptic Curve Digital Signature Algorithm (ECDSA); Communication Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Das, S. (2013). A Polymorphic Finite Field Multiplier. (Masters Thesis). Indian Institute of Science. Retrieved from http://etd.iisc.ac.in/handle/2005/2100

Chicago Manual of Style (16th Edition):

Das, Saptarsi. “A Polymorphic Finite Field Multiplier.” 2013. Masters Thesis, Indian Institute of Science. Accessed January 20, 2021. http://etd.iisc.ac.in/handle/2005/2100.

MLA Handbook (7th Edition):

Das, Saptarsi. “A Polymorphic Finite Field Multiplier.” 2013. Web. 20 Jan 2021.

Vancouver:

Das S. A Polymorphic Finite Field Multiplier. [Internet] [Masters thesis]. Indian Institute of Science; 2013. [cited 2021 Jan 20]. Available from: http://etd.iisc.ac.in/handle/2005/2100.

Council of Science Editors:

Das S. A Polymorphic Finite Field Multiplier. [Masters Thesis]. Indian Institute of Science; 2013. Available from: http://etd.iisc.ac.in/handle/2005/2100


Univerzitet u Beogradu

15. Stanisavljević, Žarko S. Визуелна репрезентација криптографских алгоритама.

Degree: Elektrotehnički fakultet, 2016, Univerzitet u Beogradu

Електротехника и рачунарство-Рачунарска техника и информатика / Electrical and Computer Engineering-Computer Engineering

У овој дисертацији је описан нови систем за визуелну репрезентацију криптографских алгоритама (COALA).… (more)

Subjects/Keywords: Algorithm visualization; eLearning tools; Cryptographic algorithms; Data security; Security education; AES; DES; Diffie-Hellman; RSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stanisavljević, . S. (2016). Визуелна репрезентација криптографских алгоритама. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:11225/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Stanisavljević, Žarko S. “Визуелна репрезентација криптографских алгоритама.” 2016. Thesis, Univerzitet u Beogradu. Accessed January 20, 2021. https://fedorabg.bg.ac.rs/fedora/get/o:11225/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Stanisavljević, Žarko S. “Визуелна репрезентација криптографских алгоритама.” 2016. Web. 20 Jan 2021.

Vancouver:

Stanisavljević S. Визуелна репрезентација криптографских алгоритама. [Internet] [Thesis]. Univerzitet u Beogradu; 2016. [cited 2021 Jan 20]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:11225/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Stanisavljević S. Визуелна репрезентација криптографских алгоритама. [Thesis]. Univerzitet u Beogradu; 2016. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:11225/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

16. Jakubíček, Michal. Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power.

Degree: 2018, Brno University of Technology

 Bachelor thesis in the first chapter deals with the concept of quality of electric power and its parameters. The next chapter is focused on systems… (more)

Subjects/Keywords: Kvalita elektrické energie; kryptografie; asymetrický kryptosystém; Diffie–Hellmanův protokol; BigDigits; GMP; OpenSSL; optimalizace; Montgomeryho modulární násobení.; Quality of electric power; cryptography; asymmetric cryptosystem; Diffie–Hellman protocol; BigDigits; GMP; OpenSSL; optimization; Montgomery modular multiplication.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jakubíček, M. (2018). Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/25072

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jakubíček, Michal. “Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power.” 2018. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/25072.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jakubíček, Michal. “Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power.” 2018. Web. 20 Jan 2021.

Vancouver:

Jakubíček M. Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/25072.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jakubíček M. Návrh zabezpečení systému dálkového měření kvality dodávky elektrické energie: Security design for system of remote quality measurement of electric power. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/25072

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

17. Procházka, Jaroslav. Zabezpečený přístup k informačnímu panelu: Secure access to information panel.

Degree: 2019, Brno University of Technology

 My Thesis deals with secure access to the information panel, which deals with methods of communication of information panels with control unit. There are described… (more)

Subjects/Keywords: komunikační protokol; kryptografie; protokol Diffie-Hellman; digitální podpis; útok „Man in the middle“; communication protocol; cryptography; protocol Diffie-Hellman; digital signature; the attack „Man in the middle“

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Procházka, J. (2019). Zabezpečený přístup k informačnímu panelu: Secure access to information panel. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/9466

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Procházka, Jaroslav. “Zabezpečený přístup k informačnímu panelu: Secure access to information panel.” 2019. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/9466.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Procházka, Jaroslav. “Zabezpečený přístup k informačnímu panelu: Secure access to information panel.” 2019. Web. 20 Jan 2021.

Vancouver:

Procházka J. Zabezpečený přístup k informačnímu panelu: Secure access to information panel. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/9466.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Procházka J. Zabezpečený přístup k informačnímu panelu: Secure access to information panel. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/9466

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Idrees, Zunera. Elliptic Curves Cryptography.

Degree: Physics and Mathematics, 2012, Linnaeus University

  In the thesis we study the elliptic curves and its use in cryptography. Elliptic curvesencompasses a vast area of mathematics. Elliptic curves have basics… (more)

Subjects/Keywords: Group Theory and Number Theory; Elliptic Curves; Elliptic Curves over Finite Fields; Applications of Elliptic Curves.; Mathematics; Matematik

…x5B;3], [5] and [4]. Now we define the elliptic curves over finite… …Hellman algorithm and ElGamal cryptosystem. The material in this section is taken from [4… …key cryptography. The concept of public key cryptography was first introduced by Diffie and… …this implies that x must be even. 18 4.5 The Pohlig-Hellman Algorithm The idea of… …the middle of the 1980’s. Lenstra used elliptic curves to factorize integers. In many… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Idrees, Z. (2012). Elliptic Curves Cryptography. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17552

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Idrees, Zunera. “Elliptic Curves Cryptography.” 2012. Thesis, Linnaeus University. Accessed January 20, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17552.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Idrees, Zunera. “Elliptic Curves Cryptography.” 2012. Web. 20 Jan 2021.

Vancouver:

Idrees Z. Elliptic Curves Cryptography. [Internet] [Thesis]. Linnaeus University; 2012. [cited 2021 Jan 20]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17552.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Idrees Z. Elliptic Curves Cryptography. [Thesis]. Linnaeus University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17552

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Bradford

19. Almotiri, Sultan H. Design and evaluation of security mechanism for routing in MANETs : elliptic curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET).

Degree: PhD, 2013, University of Bradford

 Ensuring trustworthiness through mobile nodes is a serious issue. Indeed, securing the routing protocols in Mobile Ad Hoc Network (MANET) is of paramount importance. A… (more)

Subjects/Keywords: 004.6; Elliptic Curve Diffie-Hellman cryptography; Dynamic Source Routing protocol (DSR); Mobile Ad Hoc Network (MANET); Routing security; Design; Evaluation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Almotiri, S. H. (2013). Design and evaluation of security mechanism for routing in MANETs : elliptic curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET). (Doctoral Dissertation). University of Bradford. Retrieved from http://hdl.handle.net/10454/5718

Chicago Manual of Style (16th Edition):

Almotiri, Sultan H. “Design and evaluation of security mechanism for routing in MANETs : elliptic curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET).” 2013. Doctoral Dissertation, University of Bradford. Accessed January 20, 2021. http://hdl.handle.net/10454/5718.

MLA Handbook (7th Edition):

Almotiri, Sultan H. “Design and evaluation of security mechanism for routing in MANETs : elliptic curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET).” 2013. Web. 20 Jan 2021.

Vancouver:

Almotiri SH. Design and evaluation of security mechanism for routing in MANETs : elliptic curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET). [Internet] [Doctoral dissertation]. University of Bradford; 2013. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/10454/5718.

Council of Science Editors:

Almotiri SH. Design and evaluation of security mechanism for routing in MANETs : elliptic curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET). [Doctoral Dissertation]. University of Bradford; 2013. Available from: http://hdl.handle.net/10454/5718


Brno University of Technology

20. Hampl, Dalibor. Alternativní metody v kryptografii: Alternative methods in cryptology.

Degree: 2019, Brno University of Technology

 In the first part of this thesis explains, what is generally cryptography, generally analyze the problem of the current encryption methods. These include asymmetric, symmetric… (more)

Subjects/Keywords: Šifrování; mříž; asymetrická šifrovací metoda; digitální podpis; GGH; Babaiův algoritmus; dobrá báze; špatná báze; problém nejkratšího vektoru; problém nejbližšího vektoru; XTR; Diffie-Hellmanův protokol; DHP; DLP; Encryption; lattice; asymmetric cryptosystem; digital signature; GGH; Babai´s algorithm; good basis; bad basis; shortest vector problem; closest vector problem; XTR; Diffie-Hellman protocol; DHP; DLP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hampl, D. (2019). Alternativní metody v kryptografii: Alternative methods in cryptology. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/5924

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hampl, Dalibor. “Alternativní metody v kryptografii: Alternative methods in cryptology.” 2019. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/5924.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hampl, Dalibor. “Alternativní metody v kryptografii: Alternative methods in cryptology.” 2019. Web. 20 Jan 2021.

Vancouver:

Hampl D. Alternativní metody v kryptografii: Alternative methods in cryptology. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/5924.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hampl D. Alternativní metody v kryptografii: Alternative methods in cryptology. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/5924

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Youngstown State University

21. Shoaib, Naveed. A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks.

Degree: MSin Mathematics, Department of Mathematics and Statistics, 2009, Youngstown State University

 Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. One of the biggest challenges faced by researches… (more)

Subjects/Keywords: Communication; Computer Science; Information Systems; Mathematics; Wireless Sensor Networks; Sun SPOTS; Diffie-Hellman Key-Exchange Protocol; Elliptic Curve Cryptography; Elliptic Curve Diffie-Hellman; Portable Diffie-Hellman

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shoaib, N. (2009). A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks. (Masters Thesis). Youngstown State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253597142

Chicago Manual of Style (16th Edition):

Shoaib, Naveed. “A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks.” 2009. Masters Thesis, Youngstown State University. Accessed January 20, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253597142.

MLA Handbook (7th Edition):

Shoaib, Naveed. “A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks.” 2009. Web. 20 Jan 2021.

Vancouver:

Shoaib N. A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks. [Internet] [Masters thesis]. Youngstown State University; 2009. [cited 2021 Jan 20]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253597142.

Council of Science Editors:

Shoaib N. A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks. [Masters Thesis]. Youngstown State University; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253597142

22. Swart, David Curtis. An Elliptic Exploration.

Degree: MS, Mathematics and Statistics, 2016, Encompass Digital Archive, Eastern Kentucky University

  In this paper I will be giving an introduction to an interesting kind of equation called elliptic curves, and how they can be used… (more)

Subjects/Keywords: Cryptography; Elliptic Curves; Math; Number Theory; Schoof's Algorithm; Applied Mathematics; Defense and Security Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Swart, D. C. (2016). An Elliptic Exploration. (Masters Thesis). Encompass Digital Archive, Eastern Kentucky University. Retrieved from https://encompass.eku.edu/etd/433

Chicago Manual of Style (16th Edition):

Swart, David Curtis. “An Elliptic Exploration.” 2016. Masters Thesis, Encompass Digital Archive, Eastern Kentucky University. Accessed January 20, 2021. https://encompass.eku.edu/etd/433.

MLA Handbook (7th Edition):

Swart, David Curtis. “An Elliptic Exploration.” 2016. Web. 20 Jan 2021.

Vancouver:

Swart DC. An Elliptic Exploration. [Internet] [Masters thesis]. Encompass Digital Archive, Eastern Kentucky University; 2016. [cited 2021 Jan 20]. Available from: https://encompass.eku.edu/etd/433.

Council of Science Editors:

Swart DC. An Elliptic Exploration. [Masters Thesis]. Encompass Digital Archive, Eastern Kentucky University; 2016. Available from: https://encompass.eku.edu/etd/433


Brno University of Technology

23. Kříž, Jiří. Softwarová podpora výuky kryptosystémů založených na problému diskrétního logaritmu: Software support for cryptography system training based on discrete logarithm.

Degree: 2019, Brno University of Technology

 Current needs of human communication came to status, when most of transferred messages are considered as private and transition over non-secured communication lines in open… (more)

Subjects/Keywords: Diskrétní logaritmus; cyklická grupa; asymetrický kryptosystém; NP problém; Diffie-Hellmanův protokol; DSA; ElGamal; hash; Discrete Logarithm; Cyclic Group; Asymmetric Cryptosystem; NP problem; Diffie-Hellman Protocol; DSA; ElGamal

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kříž, J. (2019). Softwarová podpora výuky kryptosystémů založených na problému diskrétního logaritmu: Software support for cryptography system training based on discrete logarithm. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/10956

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kříž, Jiří. “Softwarová podpora výuky kryptosystémů založených na problému diskrétního logaritmu: Software support for cryptography system training based on discrete logarithm.” 2019. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/10956.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kříž, Jiří. “Softwarová podpora výuky kryptosystémů založených na problému diskrétního logaritmu: Software support for cryptography system training based on discrete logarithm.” 2019. Web. 20 Jan 2021.

Vancouver:

Kříž J. Softwarová podpora výuky kryptosystémů založených na problému diskrétního logaritmu: Software support for cryptography system training based on discrete logarithm. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/10956.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kříž J. Softwarová podpora výuky kryptosystémů založených na problému diskrétního logaritmu: Software support for cryptography system training based on discrete logarithm. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/10956

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

24. Herbrych, Daniel. Generování eliptických křivek pro kryptografický protokol: Elliptic curve generator for cryptographic protocol.

Degree: 2019, Brno University of Technology

 This thesis deals with creation of elliptic curves generator. MIRACL library and C++ language are used. One of important issues is to determine the order… (more)

Subjects/Keywords: Eliptické křivky; MIRACL; kryptografie; generování eliptických křivek; SEA algoritmus; CM metoda; ECIES; Elliptic curves; MIRACL; cryptography; generating of elliptic curves; SEA algorithm; CM method; ECIES

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Herbrych, D. (2019). Generování eliptických křivek pro kryptografický protokol: Elliptic curve generator for cryptographic protocol. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/177523

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Herbrych, Daniel. “Generování eliptických křivek pro kryptografický protokol: Elliptic curve generator for cryptographic protocol.” 2019. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/177523.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Herbrych, Daniel. “Generování eliptických křivek pro kryptografický protokol: Elliptic curve generator for cryptographic protocol.” 2019. Web. 20 Jan 2021.

Vancouver:

Herbrych D. Generování eliptických křivek pro kryptografický protokol: Elliptic curve generator for cryptographic protocol. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/177523.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Herbrych D. Generování eliptických křivek pro kryptografický protokol: Elliptic curve generator for cryptographic protocol. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/177523

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

25. [No author]. Generalizations of the Diffie-Hellman protocol : exposition and implementation .

Degree: 2008, University of Pretoria

 A generalisation of the Diffie-Hellman protocol is studied in this dissertation. In the generalisation polynomials are used to reduce the representation size of a public… (more)

Subjects/Keywords: Diffie-hellman protocol; Polynomials; Model predictions; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2008). Generalizations of the Diffie-Hellman protocol : exposition and implementation . (Masters Thesis). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-04212008-142906/

Chicago Manual of Style (16th Edition):

author], [No. “Generalizations of the Diffie-Hellman protocol : exposition and implementation .” 2008. Masters Thesis, University of Pretoria. Accessed January 20, 2021. http://upetd.up.ac.za/thesis/available/etd-04212008-142906/.

MLA Handbook (7th Edition):

author], [No. “Generalizations of the Diffie-Hellman protocol : exposition and implementation .” 2008. Web. 20 Jan 2021.

Vancouver:

author] [. Generalizations of the Diffie-Hellman protocol : exposition and implementation . [Internet] [Masters thesis]. University of Pretoria; 2008. [cited 2021 Jan 20]. Available from: http://upetd.up.ac.za/thesis/available/etd-04212008-142906/.

Council of Science Editors:

author] [. Generalizations of the Diffie-Hellman protocol : exposition and implementation . [Masters Thesis]. University of Pretoria; 2008. Available from: http://upetd.up.ac.za/thesis/available/etd-04212008-142906/


University of Pretoria

26. Van der Berg, Sarel Johan. Generalizations of the Diffie-Hellman protocol : exposition and implementation.

Degree: MSc, Mathematics and Applied Mathematics, 2008, University of Pretoria

 A generalisation of the Diffie-Hellman protocol is studied in this dissertation. In the generalisation polynomials are used to reduce the representation size of a public… (more)

Subjects/Keywords: Diffie-hellman protocol; Polynomials; Model predictions; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van der Berg, S. (2008). Generalizations of the Diffie-Hellman protocol : exposition and implementation. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/24053

Chicago Manual of Style (16th Edition):

Van der Berg, Sarel. “Generalizations of the Diffie-Hellman protocol : exposition and implementation.” 2008. Masters Thesis, University of Pretoria. Accessed January 20, 2021. http://hdl.handle.net/2263/24053.

MLA Handbook (7th Edition):

Van der Berg, Sarel. “Generalizations of the Diffie-Hellman protocol : exposition and implementation.” 2008. Web. 20 Jan 2021.

Vancouver:

Van der Berg S. Generalizations of the Diffie-Hellman protocol : exposition and implementation. [Internet] [Masters thesis]. University of Pretoria; 2008. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/2263/24053.

Council of Science Editors:

Van der Berg S. Generalizations of the Diffie-Hellman protocol : exposition and implementation. [Masters Thesis]. University of Pretoria; 2008. Available from: http://hdl.handle.net/2263/24053


Rochester Institute of Technology

27. Campbell, Roderic. Efficient encryption on limited devices.

Degree: Computer Science (GCCIS), 2006, Rochester Institute of Technology

 Encryption algorithms have been used since the dawn of time to ensure secure communication over insecure communication channels. Once a secret encryption key is established… (more)

Subjects/Keywords: Cryptography; Diffie-Hellman; ECC; Elliptic curve crytography; J2ME; Java; Key exchange; Security; XTR

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Campbell, R. (2006). Efficient encryption on limited devices. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/6913

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Campbell, Roderic. “Efficient encryption on limited devices.” 2006. Thesis, Rochester Institute of Technology. Accessed January 20, 2021. https://scholarworks.rit.edu/theses/6913.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Campbell, Roderic. “Efficient encryption on limited devices.” 2006. Web. 20 Jan 2021.

Vancouver:

Campbell R. Efficient encryption on limited devices. [Internet] [Thesis]. Rochester Institute of Technology; 2006. [cited 2021 Jan 20]. Available from: https://scholarworks.rit.edu/theses/6913.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Campbell R. Efficient encryption on limited devices. [Thesis]. Rochester Institute of Technology; 2006. Available from: https://scholarworks.rit.edu/theses/6913

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

28. Marček, Ján. Odposlech moderních šifrovaných protokolů: Interception of Modern Encrypted Protocols.

Degree: 2019, Brno University of Technology

 This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic… (more)

Subjects/Keywords: Důvěrnost; integrita dát; autentičnost; nepopíratelnost; zabezpečováni; bezpečnost; šifrovanie; asymetrický algoritmus; symetrický algoritmus; Hash funckie; Diffie-Hellman; SHA1; MD5; MAC; HMAC; DDOS; MITM; tajný klíč; veřejný klíč; SSL; TLS; proxy; TCP; soket; ARP; arp otrávenie; DNS; DNS otrávení; certifikát; certifikační autorita; CA; odposlech; podvržení; web; internet; HTTP; HTTPS; TCP/IP; odpočúvanie.; Confidentiality; data integrity; authentication; non-repudiation; hash functions; Diffie-Hellman; SHA1; MD5; MAC; HMAC; DDOS; MITM; hash; asymmetric key algorithm; symmetric key algorithm; cryptography; public key; private key; SSL; secure socket layer; TLS; proxy; TCP; socket; ARP; arp poisoning; arp cache poisoning; DNS; DNS poisoning; certificate; certificate authority; CA; interception; spoofing; web; internet; HTTP; HTTPS; TCP/IP; sniffing; eavesdropping.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marček, J. (2019). Odposlech moderních šifrovaných protokolů: Interception of Modern Encrypted Protocols. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/53570

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Marček, Ján. “Odposlech moderních šifrovaných protokolů: Interception of Modern Encrypted Protocols.” 2019. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/53570.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Marček, Ján. “Odposlech moderních šifrovaných protokolů: Interception of Modern Encrypted Protocols.” 2019. Web. 20 Jan 2021.

Vancouver:

Marček J. Odposlech moderních šifrovaných protokolů: Interception of Modern Encrypted Protocols. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/53570.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Marček J. Odposlech moderních šifrovaných protokolů: Interception of Modern Encrypted Protocols. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/53570

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

29. Bruckner, Tomáš. Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication.

Degree: 2020, Brno University of Technology

 This thesis deals with social network Facebook from perspective of computer forensic science with focus on obtaining sensitive information about tracked users. Its main goal… (more)

Subjects/Keywords: Facebook; Man-in-the-Middle; rekonstrukce dat; dolování dat; NetFox; SSL; HTTPS; Graph API; Selenium; Diffie-Hellman; RSA; Facebook; Man-in-the-Middle; data reconstruction; data mining; NetFox; SSL; HTTPS; Graph API; Selenium; Diffie-Hellman; RSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bruckner, T. (2020). Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/190025

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bruckner, Tomáš. “Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication.” 2020. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/190025.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bruckner, Tomáš. “Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication.” 2020. Web. 20 Jan 2021.

Vancouver:

Bruckner T. Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/190025.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bruckner T. Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/190025

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

30. Bruckner, Tomáš. Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication.

Degree: 2020, Brno University of Technology

 This thesis deals with social network Facebook from perspective of computer forensic science with focus on obtaining sensitive information about tracked users. Its main goal… (more)

Subjects/Keywords: Facebook; Man-in-the-Middle; rekonstrukce dat; dolování dat; NetFox; SSL; HTTPS; Graph API; Selenium; Diffie-Hellman; RSA; Facebook; Man-in-the-Middle; data reconstruction; data mining; NetFox; SSL; HTTPS; Graph API; Selenium; Diffie-Hellman; RSA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bruckner, T. (2020). Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/188403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bruckner, Tomáš. “Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication.” 2020. Thesis, Brno University of Technology. Accessed January 20, 2021. http://hdl.handle.net/11012/188403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bruckner, Tomáš. “Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication.” 2020. Web. 20 Jan 2021.

Vancouver:

Bruckner T. Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 20]. Available from: http://hdl.handle.net/11012/188403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bruckner T. Rekonstrukce zachycené komunikace a dolování dat na sociální síti Facebook: Facebook Social Network Datamining and Reconstruction of Captured Communication. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/188403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [23785]

.