Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(authentication). Showing records 1 – 30 of 833 total matches.

[1] [2] [3] [4] [5] … [28]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Otago

1. McComb, Kiri Alan. Geochemical Authentication of New Zealand Honey .

Degree: 2012, University of Otago

 Fraudulent practices in relation to production and distribution of foodstuffs have been prevalent throughout history. The intentional or accidental tampering of a food supply for… (more)

Subjects/Keywords: Authentication; Honey

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McComb, K. A. (2012). Geochemical Authentication of New Zealand Honey . (Doctoral Dissertation). University of Otago. Retrieved from http://hdl.handle.net/10523/2351

Chicago Manual of Style (16th Edition):

McComb, Kiri Alan. “Geochemical Authentication of New Zealand Honey .” 2012. Doctoral Dissertation, University of Otago. Accessed September 17, 2019. http://hdl.handle.net/10523/2351.

MLA Handbook (7th Edition):

McComb, Kiri Alan. “Geochemical Authentication of New Zealand Honey .” 2012. Web. 17 Sep 2019.

Vancouver:

McComb KA. Geochemical Authentication of New Zealand Honey . [Internet] [Doctoral dissertation]. University of Otago; 2012. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10523/2351.

Council of Science Editors:

McComb KA. Geochemical Authentication of New Zealand Honey . [Doctoral Dissertation]. University of Otago; 2012. Available from: http://hdl.handle.net/10523/2351

2. Ojaide, Christopher Lucky. INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution.

Degree: 2010, , School of Computing

  ABSTRACT An effective national identification system is a necessity in any national government for the proper implementation and execution of its governmental policies and… (more)

Subjects/Keywords: Identification; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ojaide, C. L. (2010). INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution. (Thesis). , School of Computing. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3836

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ojaide, Christopher Lucky. “INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution.” 2010. Thesis, , School of Computing. Accessed September 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3836.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ojaide, Christopher Lucky. “INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution.” 2010. Web. 17 Sep 2019.

Vancouver:

Ojaide CL. INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution. [Internet] [Thesis]. , School of Computing; 2010. [cited 2019 Sep 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3836.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ojaide CL. INFORMATION FLOW IN A RESTRUCTURED NIGERIA NATIONAL IDENTIFICATION SYSTEM : Election and Census Fraud Solution. [Thesis]. , School of Computing; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3836

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Baldimtsi, Foteini. Efficient Cryptography for Information Privacy.

Degree: PhD, Computer Science, 2014, Brown University

 In the modern digital society, individuals, businesses and governments perform numerous everyday tasks such as shopping, banking and commuting using electronic media. Although these electronic… (more)

Subjects/Keywords: private authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Baldimtsi, F. (2014). Efficient Cryptography for Information Privacy. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:386305/

Chicago Manual of Style (16th Edition):

Baldimtsi, Foteini. “Efficient Cryptography for Information Privacy.” 2014. Doctoral Dissertation, Brown University. Accessed September 17, 2019. https://repository.library.brown.edu/studio/item/bdr:386305/.

MLA Handbook (7th Edition):

Baldimtsi, Foteini. “Efficient Cryptography for Information Privacy.” 2014. Web. 17 Sep 2019.

Vancouver:

Baldimtsi F. Efficient Cryptography for Information Privacy. [Internet] [Doctoral dissertation]. Brown University; 2014. [cited 2019 Sep 17]. Available from: https://repository.library.brown.edu/studio/item/bdr:386305/.

Council of Science Editors:

Baldimtsi F. Efficient Cryptography for Information Privacy. [Doctoral Dissertation]. Brown University; 2014. Available from: https://repository.library.brown.edu/studio/item/bdr:386305/


University of Waterloo

4. Khan, Hassan. Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios.

Degree: 2016, University of Waterloo

 Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication(more)

Subjects/Keywords: Security; Authentication; Implicit authentication; Usable security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khan, H. (2016). Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10621

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Khan, Hassan. “Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios.” 2016. Thesis, University of Waterloo. Accessed September 17, 2019. http://hdl.handle.net/10012/10621.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Khan, Hassan. “Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios.” 2016. Web. 17 Sep 2019.

Vancouver:

Khan H. Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios. [Internet] [Thesis]. University of Waterloo; 2016. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10012/10621.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Khan H. Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios. [Thesis]. University of Waterloo; 2016. Available from: http://hdl.handle.net/10012/10621

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

5. Yang, Shukun. A diversity-based framework for dynamic password policy generation.

Degree: MS, Electrical and Computer Engineering, 2016, Georgia Tech

 To keep password users from creating simple and common passwords, major websites and applications provide a password-strength measure, namely a password checker that displays instant… (more)

Subjects/Keywords: Password; Authentication; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, S. (2016). A diversity-based framework for dynamic password policy generation. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/58192

Chicago Manual of Style (16th Edition):

Yang, Shukun. “A diversity-based framework for dynamic password policy generation.” 2016. Masters Thesis, Georgia Tech. Accessed September 17, 2019. http://hdl.handle.net/1853/58192.

MLA Handbook (7th Edition):

Yang, Shukun. “A diversity-based framework for dynamic password policy generation.” 2016. Web. 17 Sep 2019.

Vancouver:

Yang S. A diversity-based framework for dynamic password policy generation. [Internet] [Masters thesis]. Georgia Tech; 2016. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/1853/58192.

Council of Science Editors:

Yang S. A diversity-based framework for dynamic password policy generation. [Masters Thesis]. Georgia Tech; 2016. Available from: http://hdl.handle.net/1853/58192


University of Florida

6. Reaves, Bradley G. Authentication Techniques for Heterogeneous Telephone Networks.

Degree: PhD, Computer Engineering - Computer and Information Science and Engineering, 2017, University of Florida

 The global telephone network is relied upon daily by billions worldwide for reliable communications. Beyond their use for communications, telephones are being used as a… (more)

Subjects/Keywords: authentication  – computersecurity  – telephone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reaves, B. G. (2017). Authentication Techniques for Heterogeneous Telephone Networks. (Doctoral Dissertation). University of Florida. Retrieved from http://ufdc.ufl.edu/UFE0051506

Chicago Manual of Style (16th Edition):

Reaves, Bradley G. “Authentication Techniques for Heterogeneous Telephone Networks.” 2017. Doctoral Dissertation, University of Florida. Accessed September 17, 2019. http://ufdc.ufl.edu/UFE0051506.

MLA Handbook (7th Edition):

Reaves, Bradley G. “Authentication Techniques for Heterogeneous Telephone Networks.” 2017. Web. 17 Sep 2019.

Vancouver:

Reaves BG. Authentication Techniques for Heterogeneous Telephone Networks. [Internet] [Doctoral dissertation]. University of Florida; 2017. [cited 2019 Sep 17]. Available from: http://ufdc.ufl.edu/UFE0051506.

Council of Science Editors:

Reaves BG. Authentication Techniques for Heterogeneous Telephone Networks. [Doctoral Dissertation]. University of Florida; 2017. Available from: http://ufdc.ufl.edu/UFE0051506


University of Cambridge

7. Bonneau, Joseph. Guessing human-chosen secrets.

Degree: PhD, 2012, University of Cambridge

 Authenticating humans to computers remains a notable weak point in computer security despite decades of effort. Although the security research community has explored dozens of… (more)

Subjects/Keywords: 005.8; Passwords; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bonneau, J. (2012). Guessing human-chosen secrets. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189

Chicago Manual of Style (16th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets.” 2012. Doctoral Dissertation, University of Cambridge. Accessed September 17, 2019. https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189.

MLA Handbook (7th Edition):

Bonneau, Joseph. “Guessing human-chosen secrets.” 2012. Web. 17 Sep 2019.

Vancouver:

Bonneau J. Guessing human-chosen secrets. [Internet] [Doctoral dissertation]. University of Cambridge; 2012. [cited 2019 Sep 17]. Available from: https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189.

Council of Science Editors:

Bonneau J. Guessing human-chosen secrets. [Doctoral Dissertation]. University of Cambridge; 2012. Available from: https://www.repository.cam.ac.uk/handle/1810/243444 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.553189


Delft University of Technology

8. Cordeiro, S.L.G. Gesture based password authentication for mobile consumer devices:.

Degree: 2011, Delft University of Technology

 Signet has two core components that aim at supporting the user in making safe and diverse password choices. By choosing image hints automatically, the user… (more)

Subjects/Keywords: passwords; authentication; gesture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cordeiro, S. L. G. (2011). Gesture based password authentication for mobile consumer devices:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:1528faac-1a66-4d7d-8afe-b14e1c539213

Chicago Manual of Style (16th Edition):

Cordeiro, S L G. “Gesture based password authentication for mobile consumer devices:.” 2011. Masters Thesis, Delft University of Technology. Accessed September 17, 2019. http://resolver.tudelft.nl/uuid:1528faac-1a66-4d7d-8afe-b14e1c539213.

MLA Handbook (7th Edition):

Cordeiro, S L G. “Gesture based password authentication for mobile consumer devices:.” 2011. Web. 17 Sep 2019.

Vancouver:

Cordeiro SLG. Gesture based password authentication for mobile consumer devices:. [Internet] [Masters thesis]. Delft University of Technology; 2011. [cited 2019 Sep 17]. Available from: http://resolver.tudelft.nl/uuid:1528faac-1a66-4d7d-8afe-b14e1c539213.

Council of Science Editors:

Cordeiro SLG. Gesture based password authentication for mobile consumer devices:. [Masters Thesis]. Delft University of Technology; 2011. Available from: http://resolver.tudelft.nl/uuid:1528faac-1a66-4d7d-8afe-b14e1c539213


Oklahoma State University

9. Kancharlapalli, Sunil. Smartpass: a New Authentication Scheme Using Geolocation.

Degree: Computer Science, 2014, Oklahoma State University

Authentication is critical in today's digital world. Everything from e-mail access to e-commerce to online banking requires users to authenticate themselves. The most common form… (more)

Subjects/Keywords: authentication; passwords; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kancharlapalli, S. (2014). Smartpass: a New Authentication Scheme Using Geolocation. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/14926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kancharlapalli, Sunil. “Smartpass: a New Authentication Scheme Using Geolocation.” 2014. Thesis, Oklahoma State University. Accessed September 17, 2019. http://hdl.handle.net/11244/14926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kancharlapalli, Sunil. “Smartpass: a New Authentication Scheme Using Geolocation.” 2014. Web. 17 Sep 2019.

Vancouver:

Kancharlapalli S. Smartpass: a New Authentication Scheme Using Geolocation. [Internet] [Thesis]. Oklahoma State University; 2014. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/11244/14926.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kancharlapalli S. Smartpass: a New Authentication Scheme Using Geolocation. [Thesis]. Oklahoma State University; 2014. Available from: http://hdl.handle.net/11244/14926

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

10. Addas, Alaadin. Systems and models for secure fallback authentication.

Degree: 2018, University of Ontario Institute of Technology

 Fallback authentication (FA) techniques such as security questions, Email resets, and SMS resets have significant security flaws that easily undermine the primary method of authentication.… (more)

Subjects/Keywords: Geographic authentication; Fallback authentication; Autobiographical authentication; Known adversary

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Addas, A. (2018). Systems and models for secure fallback authentication. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/1004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Addas, Alaadin. “Systems and models for secure fallback authentication.” 2018. Thesis, University of Ontario Institute of Technology. Accessed September 17, 2019. http://hdl.handle.net/10155/1004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Addas, Alaadin. “Systems and models for secure fallback authentication.” 2018. Web. 17 Sep 2019.

Vancouver:

Addas A. Systems and models for secure fallback authentication. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10155/1004.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Addas A. Systems and models for secure fallback authentication. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/1004

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

11. Senathipathi K. Behavioural biometric authentication with reference to keystroke dynamics;.

Degree: Behavioural biometric authentication with reference to keystroke dynamics, 2015, Anna University

Computer security has become an indispensable and critical aspect in the motif evolution and application of computer Since cyber crime and security remain the dominant… (more)

Subjects/Keywords: Biometric authentication; Genetic algorithm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

K, S. (2015). Behavioural biometric authentication with reference to keystroke dynamics;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/41935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

K, Senathipathi. “Behavioural biometric authentication with reference to keystroke dynamics;.” 2015. Thesis, Anna University. Accessed September 17, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/41935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

K, Senathipathi. “Behavioural biometric authentication with reference to keystroke dynamics;.” 2015. Web. 17 Sep 2019.

Vancouver:

K S. Behavioural biometric authentication with reference to keystroke dynamics;. [Internet] [Thesis]. Anna University; 2015. [cited 2019 Sep 17]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/41935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

K S. Behavioural biometric authentication with reference to keystroke dynamics;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/41935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

12. Veras Guimaraes, Rafael. An investigation of semantic patterns in passwords.

Degree: 2013, University of Ontario Institute of Technology

 The advent of large password leaks in recent years has exposed the security problems of passwords and enabled deeper empirical investigation of password patterns. Researchers… (more)

Subjects/Keywords: Security; Passwords; Authentication; Semantics; Guessing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Veras Guimaraes, R. (2013). An investigation of semantic patterns in passwords. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Veras Guimaraes, Rafael. “An investigation of semantic patterns in passwords.” 2013. Thesis, University of Ontario Institute of Technology. Accessed September 17, 2019. http://hdl.handle.net/10155/331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Veras Guimaraes, Rafael. “An investigation of semantic patterns in passwords.” 2013. Web. 17 Sep 2019.

Vancouver:

Veras Guimaraes R. An investigation of semantic patterns in passwords. [Internet] [Thesis]. University of Ontario Institute of Technology; 2013. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10155/331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Veras Guimaraes R. An investigation of semantic patterns in passwords. [Thesis]. University of Ontario Institute of Technology; 2013. Available from: http://hdl.handle.net/10155/331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

13. MacRae, Brent Alexander. Strategies and applications for creating more memorable passwords.

Degree: 2016, University of Ontario Institute of Technology

 As we continue to learn and grow in an ever evolving technological age, we deepen our understanding of the importance of authentication. There are many… (more)

Subjects/Keywords: Passwords; Authentication; Memorability; Security; Usability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MacRae, B. A. (2016). Strategies and applications for creating more memorable passwords. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/876

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

MacRae, Brent Alexander. “Strategies and applications for creating more memorable passwords.” 2016. Thesis, University of Ontario Institute of Technology. Accessed September 17, 2019. http://hdl.handle.net/10155/876.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

MacRae, Brent Alexander. “Strategies and applications for creating more memorable passwords.” 2016. Web. 17 Sep 2019.

Vancouver:

MacRae BA. Strategies and applications for creating more memorable passwords. [Internet] [Thesis]. University of Ontario Institute of Technology; 2016. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10155/876.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

MacRae BA. Strategies and applications for creating more memorable passwords. [Thesis]. University of Ontario Institute of Technology; 2016. Available from: http://hdl.handle.net/10155/876

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

14. Sankara, Subramanian R S. A study on cryptography for Intrinsic authentication applications; -.

Degree: Science and Humanities, 2014, Anna University

Cryptography is the practice and study of hiding information In newlinemodern times cryptography is considered as a branch of both mathematics newlineand computer science and… (more)

Subjects/Keywords: Cryptography; Intrinsic authentication applications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sankara, S. R. S. (2014). A study on cryptography for Intrinsic authentication applications; -. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/26983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sankara, Subramanian R S. “A study on cryptography for Intrinsic authentication applications; -.” 2014. Thesis, Anna University. Accessed September 17, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/26983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sankara, Subramanian R S. “A study on cryptography for Intrinsic authentication applications; -.” 2014. Web. 17 Sep 2019.

Vancouver:

Sankara SRS. A study on cryptography for Intrinsic authentication applications; -. [Internet] [Thesis]. Anna University; 2014. [cited 2019 Sep 17]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/26983.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sankara SRS. A study on cryptography for Intrinsic authentication applications; -. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/26983

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

15. Velumani R. Robust zero watermarking for Medical image authentication;.

Degree: Robust zero watermarking for Medical image authentication, 2015, Anna University

Advancements in information and communication technology have newlinerevolutionized healthcare with dayhawk and nighthawk teleradiology newlinesolutions These services require clinical reports medical history etc to newlinesupplement… (more)

Subjects/Keywords: Medical image authentication; Teleradiology practices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

R, V. (2015). Robust zero watermarking for Medical image authentication;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/34258

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

R, Velumani. “Robust zero watermarking for Medical image authentication;.” 2015. Thesis, Anna University. Accessed September 17, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/34258.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

R, Velumani. “Robust zero watermarking for Medical image authentication;.” 2015. Web. 17 Sep 2019.

Vancouver:

R V. Robust zero watermarking for Medical image authentication;. [Internet] [Thesis]. Anna University; 2015. [cited 2019 Sep 17]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34258.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

R V. Robust zero watermarking for Medical image authentication;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/34258

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade do Minho

16. Carvalho, Nuno Tiago Ferreira de. A practical validation of Homomorphic Message Authentication schemes .

Degree: 2014, Universidade do Minho

 Currently, cloud computing is very appealing because it allows the user to outsource his data so it can later be accessed from multiple devices. The… (more)

Subjects/Keywords: Homomorphic mac; Authentication; Cloud computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carvalho, N. T. F. d. (2014). A practical validation of Homomorphic Message Authentication schemes . (Masters Thesis). Universidade do Minho. Retrieved from http://hdl.handle.net/1822/37266

Chicago Manual of Style (16th Edition):

Carvalho, Nuno Tiago Ferreira de. “A practical validation of Homomorphic Message Authentication schemes .” 2014. Masters Thesis, Universidade do Minho. Accessed September 17, 2019. http://hdl.handle.net/1822/37266.

MLA Handbook (7th Edition):

Carvalho, Nuno Tiago Ferreira de. “A practical validation of Homomorphic Message Authentication schemes .” 2014. Web. 17 Sep 2019.

Vancouver:

Carvalho NTFd. A practical validation of Homomorphic Message Authentication schemes . [Internet] [Masters thesis]. Universidade do Minho; 2014. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/1822/37266.

Council of Science Editors:

Carvalho NTFd. A practical validation of Homomorphic Message Authentication schemes . [Masters Thesis]. Universidade do Minho; 2014. Available from: http://hdl.handle.net/1822/37266

17. Amo, Keiji. A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: user authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amo, K. (n.d.). A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/2073

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Amo, Keiji. “A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed September 17, 2019. http://hdl.handle.net/10061/2073.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Amo, Keiji. “A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ.” Web. 17 Sep 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Amo K. A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10061/2073.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Amo K. A User Authentication Method with the Help of Simple Strage Devices : 補助記憶装置を用いた個人認証法; ホジョ キオク ソウチ オ モチイタ コジン ニンショウホウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/2073

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Plymouth

18. Saevanee, Hataichanok. Continuous user authentication using multi-modal biometrics.

Degree: PhD, 2014, University of Plymouth

 It is commonly acknowledged that mobile devices now form an integral part of an individual’s everyday life. The modern mobile handheld devices are capable to… (more)

Subjects/Keywords: 005.8; Biometrics; Authentication; Mobile Devices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saevanee, H. (2014). Continuous user authentication using multi-modal biometrics. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3033

Chicago Manual of Style (16th Edition):

Saevanee, Hataichanok. “Continuous user authentication using multi-modal biometrics.” 2014. Doctoral Dissertation, University of Plymouth. Accessed September 17, 2019. http://hdl.handle.net/10026.1/3033.

MLA Handbook (7th Edition):

Saevanee, Hataichanok. “Continuous user authentication using multi-modal biometrics.” 2014. Web. 17 Sep 2019.

Vancouver:

Saevanee H. Continuous user authentication using multi-modal biometrics. [Internet] [Doctoral dissertation]. University of Plymouth; 2014. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10026.1/3033.

Council of Science Editors:

Saevanee H. Continuous user authentication using multi-modal biometrics. [Doctoral Dissertation]. University of Plymouth; 2014. Available from: http://hdl.handle.net/10026.1/3033

19. Ralston, Matthew. An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements.

Degree: 2013, California State University – San Marcos

 The DREAM Lesson Plan APP, developed by previous researchers of CSUSM aimed to provide a process for approved K-12 teachers to use when creating lessons.… (more)

Subjects/Keywords: iPad; Authentication; iOS; xcode; json

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ralston, M. (2013). An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.8/335

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ralston, Matthew. “An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. ” 2013. Thesis, California State University – San Marcos. Accessed September 17, 2019. http://hdl.handle.net/10211.8/335.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ralston, Matthew. “An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. ” 2013. Web. 17 Sep 2019.

Vancouver:

Ralston M. An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. [Internet] [Thesis]. California State University – San Marcos; 2013. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10211.8/335.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ralston M. An Improvement to The DREAM Lesson Plan APP on the iPad Platform with Authentication and User Enhancements. [Thesis]. California State University – San Marcos; 2013. Available from: http://hdl.handle.net/10211.8/335

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ontario Institute of Technology

20. Maraj, Amit. Do extroverts create stronger passwords?.

Degree: 2018, University of Ontario Institute of Technology

 We investigate the relationship between personality types and the strength of created and selected passwords. For this purpose, we conducted an experiment on Amazon???s Mechanical… (more)

Subjects/Keywords: Passwords; Personality; Personalities; Password; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maraj, A. (2018). Do extroverts create stronger passwords?. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/917

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Maraj, Amit. “Do extroverts create stronger passwords?.” 2018. Thesis, University of Ontario Institute of Technology. Accessed September 17, 2019. http://hdl.handle.net/10155/917.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Maraj, Amit. “Do extroverts create stronger passwords?.” 2018. Web. 17 Sep 2019.

Vancouver:

Maraj A. Do extroverts create stronger passwords?. [Internet] [Thesis]. University of Ontario Institute of Technology; 2018. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10155/917.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Maraj A. Do extroverts create stronger passwords?. [Thesis]. University of Ontario Institute of Technology; 2018. Available from: http://hdl.handle.net/10155/917

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Bukhari, Syed Majid Ali Shah. SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes.

Degree: 2009, , Department of Telecommunication Systems

SWOT analysis is performed on IMS security authentication schemes to demonstrate the effectiveness of each schemes in terms of multiple parameters and associated dependencies… (more)

Subjects/Keywords: SWOT Analysis; IMS; Security Authentication.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bukhari, S. M. A. S. (2009). SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes. (Thesis). , Department of Telecommunication Systems. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4781

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bukhari, Syed Majid Ali Shah. “SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes.” 2009. Thesis, , Department of Telecommunication Systems. Accessed September 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4781.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bukhari, Syed Majid Ali Shah. “SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes.” 2009. Web. 17 Sep 2019.

Vancouver:

Bukhari SMAS. SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes. [Internet] [Thesis]. , Department of Telecommunication Systems; 2009. [cited 2019 Sep 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4781.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bukhari SMAS. SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes. [Thesis]. , Department of Telecommunication Systems; 2009. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4781

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université Catholique de Louvain

22. Carpent, Xavier. RFID authentication and time-memory trade-offs.

Degree: 2015, Université Catholique de Louvain

RFID is a technology that allows identification and authentication of objects or persons through the use of wireless communication between tags and readers. RFID Tags… (more)

Subjects/Keywords: Security; Privacy; Cryptography; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carpent, X. (2015). RFID authentication and time-memory trade-offs. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/157885

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Carpent, Xavier. “RFID authentication and time-memory trade-offs.” 2015. Thesis, Université Catholique de Louvain. Accessed September 17, 2019. http://hdl.handle.net/2078.1/157885.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Carpent, Xavier. “RFID authentication and time-memory trade-offs.” 2015. Web. 17 Sep 2019.

Vancouver:

Carpent X. RFID authentication and time-memory trade-offs. [Internet] [Thesis]. Université Catholique de Louvain; 2015. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/2078.1/157885.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Carpent X. RFID authentication and time-memory trade-offs. [Thesis]. Université Catholique de Louvain; 2015. Available from: http://hdl.handle.net/2078.1/157885

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

23. Bhutra, Ghanshyam. Privacy-Preserving ECG Based Active Authentication (PPEA2) Scheme for Iot Devices.

Degree: MS, Computer Science, 2017, Texas A&M University

 Internet of things (IoT) devices are becoming ubiquitous in, and even essential to, many aspects of day-to-day life, from fitness trackers, pacemakers, to industrial control… (more)

Subjects/Keywords: Authentication; Privacy preserving; ECG

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bhutra, G. (2017). Privacy-Preserving ECG Based Active Authentication (PPEA2) Scheme for Iot Devices. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/169618

Chicago Manual of Style (16th Edition):

Bhutra, Ghanshyam. “Privacy-Preserving ECG Based Active Authentication (PPEA2) Scheme for Iot Devices.” 2017. Masters Thesis, Texas A&M University. Accessed September 17, 2019. http://hdl.handle.net/1969.1/169618.

MLA Handbook (7th Edition):

Bhutra, Ghanshyam. “Privacy-Preserving ECG Based Active Authentication (PPEA2) Scheme for Iot Devices.” 2017. Web. 17 Sep 2019.

Vancouver:

Bhutra G. Privacy-Preserving ECG Based Active Authentication (PPEA2) Scheme for Iot Devices. [Internet] [Masters thesis]. Texas A&M University; 2017. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/1969.1/169618.

Council of Science Editors:

Bhutra G. Privacy-Preserving ECG Based Active Authentication (PPEA2) Scheme for Iot Devices. [Masters Thesis]. Texas A&M University; 2017. Available from: http://hdl.handle.net/1969.1/169618


Vanderbilt University

24. Teng, Zhongwei. Implementation of Self-report mHealth Application and Data Analysis.

Degree: MS, Electrical Engineering, 2017, Vanderbilt University

 As a growing industry, mHealth has been adopted in many fields of healthcare, such as diabetes, hypertension, asthma, eating disorders and data collection. To improve… (more)

Subjects/Keywords: Data Analysis; Authentication; mHealth

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Teng, Z. (2017). Implementation of Self-report mHealth Application and Data Analysis. (Masters Thesis). Vanderbilt University. Retrieved from http://etd.library.vanderbilt.edu//available/etd-12052017-125613/ ;

Chicago Manual of Style (16th Edition):

Teng, Zhongwei. “Implementation of Self-report mHealth Application and Data Analysis.” 2017. Masters Thesis, Vanderbilt University. Accessed September 17, 2019. http://etd.library.vanderbilt.edu//available/etd-12052017-125613/ ;.

MLA Handbook (7th Edition):

Teng, Zhongwei. “Implementation of Self-report mHealth Application and Data Analysis.” 2017. Web. 17 Sep 2019.

Vancouver:

Teng Z. Implementation of Self-report mHealth Application and Data Analysis. [Internet] [Masters thesis]. Vanderbilt University; 2017. [cited 2019 Sep 17]. Available from: http://etd.library.vanderbilt.edu//available/etd-12052017-125613/ ;.

Council of Science Editors:

Teng Z. Implementation of Self-report mHealth Application and Data Analysis. [Masters Thesis]. Vanderbilt University; 2017. Available from: http://etd.library.vanderbilt.edu//available/etd-12052017-125613/ ;


University of New South Wales

25. Liu, Tao. On Design of Memory Data Authentication For Embedded Processor Systems.

Degree: Computer Science & Engineering, 2015, University of New South Wales

 The boom of embedded systems and their wide applications, especially in thearea of e-business and -service, have raised increasing concerns about their security. One of… (more)

Subjects/Keywords: Memory protection; Message authentication; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, T. (2015). On Design of Memory Data Authentication For Embedded Processor Systems. (Masters Thesis). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Liu, Tao. “On Design of Memory Data Authentication For Embedded Processor Systems.” 2015. Masters Thesis, University of New South Wales. Accessed September 17, 2019. http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true.

MLA Handbook (7th Edition):

Liu, Tao. “On Design of Memory Data Authentication For Embedded Processor Systems.” 2015. Web. 17 Sep 2019.

Vancouver:

Liu T. On Design of Memory Data Authentication For Embedded Processor Systems. [Internet] [Masters thesis]. University of New South Wales; 2015. [cited 2019 Sep 17]. Available from: http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true.

Council of Science Editors:

Liu T. On Design of Memory Data Authentication For Embedded Processor Systems. [Masters Thesis]. University of New South Wales; 2015. Available from: http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true

26. Stewart, Alexander. Analysis Of Possible Authentication Strategies For The Automated Identification System.

Degree: Information Assurance: M.S., Information Assurance and Information Systems, 2018, St. Cloud State University

  Automatic Identification System, commonly known as AIS, is a maritime communication system that is used to keep track of positions and activities of ships.… (more)

Subjects/Keywords: AIS; authentication; maritime; digital signature

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stewart, A. (2018). Analysis Of Possible Authentication Strategies For The Automated Identification System. (Masters Thesis). St. Cloud State University. Retrieved from https://repository.stcloudstate.edu/msia_etds/51

Chicago Manual of Style (16th Edition):

Stewart, Alexander. “Analysis Of Possible Authentication Strategies For The Automated Identification System.” 2018. Masters Thesis, St. Cloud State University. Accessed September 17, 2019. https://repository.stcloudstate.edu/msia_etds/51.

MLA Handbook (7th Edition):

Stewart, Alexander. “Analysis Of Possible Authentication Strategies For The Automated Identification System.” 2018. Web. 17 Sep 2019.

Vancouver:

Stewart A. Analysis Of Possible Authentication Strategies For The Automated Identification System. [Internet] [Masters thesis]. St. Cloud State University; 2018. [cited 2019 Sep 17]. Available from: https://repository.stcloudstate.edu/msia_etds/51.

Council of Science Editors:

Stewart A. Analysis Of Possible Authentication Strategies For The Automated Identification System. [Masters Thesis]. St. Cloud State University; 2018. Available from: https://repository.stcloudstate.edu/msia_etds/51


University of Illinois – Urbana-Champaign

27. Li, Hongyang. Privacy-preserving authentication and billing for dynamic charging of electric vehicles.

Degree: PhD, Computer Science, 2016, University of Illinois – Urbana-Champaign

 Dynamic charging of electric vehicles (EVs) is a promising technology for future electrified transportation. By installing wireless charging pads under the roadbed, dynamic charging allows… (more)

Subjects/Keywords: electric vehicle; privacy; authentication; billing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, H. (2016). Privacy-preserving authentication and billing for dynamic charging of electric vehicles. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/92707

Chicago Manual of Style (16th Edition):

Li, Hongyang. “Privacy-preserving authentication and billing for dynamic charging of electric vehicles.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed September 17, 2019. http://hdl.handle.net/2142/92707.

MLA Handbook (7th Edition):

Li, Hongyang. “Privacy-preserving authentication and billing for dynamic charging of electric vehicles.” 2016. Web. 17 Sep 2019.

Vancouver:

Li H. Privacy-preserving authentication and billing for dynamic charging of electric vehicles. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/2142/92707.

Council of Science Editors:

Li H. Privacy-preserving authentication and billing for dynamic charging of electric vehicles. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/92707


University of Plymouth

28. Hocking, Christopher George. Authentication aura : a cooperative and distributed approach to user authentication on mobile devices.

Degree: PhD, 2015, University of Plymouth

 As information technology pervades our lives we have increasingly come to rely on these evermore sophisticated and ubiquitous items of equipment. Portability and the desire… (more)

Subjects/Keywords: 005.25; user authentication; transparent; cooperative; mobile device security; authentication aura

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hocking, C. G. (2015). Authentication aura : a cooperative and distributed approach to user authentication on mobile devices. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3469

Chicago Manual of Style (16th Edition):

Hocking, Christopher George. “Authentication aura : a cooperative and distributed approach to user authentication on mobile devices.” 2015. Doctoral Dissertation, University of Plymouth. Accessed September 17, 2019. http://hdl.handle.net/10026.1/3469.

MLA Handbook (7th Edition):

Hocking, Christopher George. “Authentication aura : a cooperative and distributed approach to user authentication on mobile devices.” 2015. Web. 17 Sep 2019.

Vancouver:

Hocking CG. Authentication aura : a cooperative and distributed approach to user authentication on mobile devices. [Internet] [Doctoral dissertation]. University of Plymouth; 2015. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10026.1/3469.

Council of Science Editors:

Hocking CG. Authentication aura : a cooperative and distributed approach to user authentication on mobile devices. [Doctoral Dissertation]. University of Plymouth; 2015. Available from: http://hdl.handle.net/10026.1/3469


University of Manchester

29. Yao, Li. A structured approach to electronic authentication assurance level derivation.

Degree: PhD, 2010, University of Manchester

 We envisage a fine-grained access control solution that allows a user's access privilege to be linked to the confidence level (hereafter referred to as the… (more)

Subjects/Keywords: 621.382; adaptive authentication; authentication levels of assurance; fined-grained access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yao, L. (2010). A structured approach to electronic authentication assurance level derivation. (Doctoral Dissertation). University of Manchester. Retrieved from https://www.research.manchester.ac.uk/portal/en/theses/a-structured-approach-to-electronic-authentication-assurance-level-derivation(c6a98938-f3e1-4727-9eac-c2cb0480a3df).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.525986

Chicago Manual of Style (16th Edition):

Yao, Li. “A structured approach to electronic authentication assurance level derivation.” 2010. Doctoral Dissertation, University of Manchester. Accessed September 17, 2019. https://www.research.manchester.ac.uk/portal/en/theses/a-structured-approach-to-electronic-authentication-assurance-level-derivation(c6a98938-f3e1-4727-9eac-c2cb0480a3df).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.525986.

MLA Handbook (7th Edition):

Yao, Li. “A structured approach to electronic authentication assurance level derivation.” 2010. Web. 17 Sep 2019.

Vancouver:

Yao L. A structured approach to electronic authentication assurance level derivation. [Internet] [Doctoral dissertation]. University of Manchester; 2010. [cited 2019 Sep 17]. Available from: https://www.research.manchester.ac.uk/portal/en/theses/a-structured-approach-to-electronic-authentication-assurance-level-derivation(c6a98938-f3e1-4727-9eac-c2cb0480a3df).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.525986.

Council of Science Editors:

Yao L. A structured approach to electronic authentication assurance level derivation. [Doctoral Dissertation]. University of Manchester; 2010. Available from: https://www.research.manchester.ac.uk/portal/en/theses/a-structured-approach-to-electronic-authentication-assurance-level-derivation(c6a98938-f3e1-4727-9eac-c2cb0480a3df).html ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.525986


University of Manchester

30. Yao, Li. A Structured Approach to Electronic Authentication Assurance Level Derivation.

Degree: 2010, University of Manchester

 We envisage a fine-grained access control solution that allows a user‟s access privilege to be linked to the confidence level (hereafter referred to as the… (more)

Subjects/Keywords: adaptive authentication; authentication levels of assurance; fined-grained access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yao, L. (2010). A Structured Approach to Electronic Authentication Assurance Level Derivation. (Doctoral Dissertation). University of Manchester. Retrieved from http://www.manchester.ac.uk/escholar/uk-ac-man-scw:93165

Chicago Manual of Style (16th Edition):

Yao, Li. “A Structured Approach to Electronic Authentication Assurance Level Derivation.” 2010. Doctoral Dissertation, University of Manchester. Accessed September 17, 2019. http://www.manchester.ac.uk/escholar/uk-ac-man-scw:93165.

MLA Handbook (7th Edition):

Yao, Li. “A Structured Approach to Electronic Authentication Assurance Level Derivation.” 2010. Web. 17 Sep 2019.

Vancouver:

Yao L. A Structured Approach to Electronic Authentication Assurance Level Derivation. [Internet] [Doctoral dissertation]. University of Manchester; 2010. [cited 2019 Sep 17]. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:93165.

Council of Science Editors:

Yao L. A Structured Approach to Electronic Authentication Assurance Level Derivation. [Doctoral Dissertation]. University of Manchester; 2010. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:93165

[1] [2] [3] [4] [5] … [28]

.