Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Country:

You searched for subject:(authentication). Showing records 1 – 30 of 36 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


University of New South Wales

1. Liu, Tao. On Design of Memory Data Authentication For Embedded Processor Systems.

Degree: Computer Science & Engineering, 2015, University of New South Wales

 The boom of embedded systems and their wide applications, especially in thearea of e-business and -service, have raised increasing concerns about their security. One of… (more)

Subjects/Keywords: Memory protection; Message authentication; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, T. (2015). On Design of Memory Data Authentication For Embedded Processor Systems. (Masters Thesis). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Liu, Tao. “On Design of Memory Data Authentication For Embedded Processor Systems.” 2015. Masters Thesis, University of New South Wales. Accessed October 21, 2019. http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true.

MLA Handbook (7th Edition):

Liu, Tao. “On Design of Memory Data Authentication For Embedded Processor Systems.” 2015. Web. 21 Oct 2019.

Vancouver:

Liu T. On Design of Memory Data Authentication For Embedded Processor Systems. [Internet] [Masters thesis]. University of New South Wales; 2015. [cited 2019 Oct 21]. Available from: http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true.

Council of Science Editors:

Liu T. On Design of Memory Data Authentication For Embedded Processor Systems. [Masters Thesis]. University of New South Wales; 2015. Available from: http://handle.unsw.edu.au/1959.4/54147 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13293/SOURCE02?view=true


University of Wollongong

2. Yu, Jiangshan. Remote user authentication in distributed networks and systems.

Degree: Master of Computer Science by Research, 2012, University of Wollongong

  Entity authentication is becoming more and more important. With widespread use of distributed computer networks, for example, cellular networks, virtual reality communities, World Wide… (more)

Subjects/Keywords: authentication; SSO; three-factor authentication; identification; formal proof

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, J. (2012). Remote user authentication in distributed networks and systems. (Masters Thesis). University of Wollongong. Retrieved from 0899 OTHER INFORMATION AND COMPUTING SCIENCES ; https://ro.uow.edu.au/theses/3711

Chicago Manual of Style (16th Edition):

Yu, Jiangshan. “Remote user authentication in distributed networks and systems.” 2012. Masters Thesis, University of Wollongong. Accessed October 21, 2019. 0899 OTHER INFORMATION AND COMPUTING SCIENCES ; https://ro.uow.edu.au/theses/3711.

MLA Handbook (7th Edition):

Yu, Jiangshan. “Remote user authentication in distributed networks and systems.” 2012. Web. 21 Oct 2019.

Vancouver:

Yu J. Remote user authentication in distributed networks and systems. [Internet] [Masters thesis]. University of Wollongong; 2012. [cited 2019 Oct 21]. Available from: 0899 OTHER INFORMATION AND COMPUTING SCIENCES ; https://ro.uow.edu.au/theses/3711.

Council of Science Editors:

Yu J. Remote user authentication in distributed networks and systems. [Masters Thesis]. University of Wollongong; 2012. Available from: 0899 OTHER INFORMATION AND COMPUTING SCIENCES ; https://ro.uow.edu.au/theses/3711


University of Wollongong

3. Li, Nan. Security and Privacy in RFID Systems.

Degree: PhD, 2015, University of Wollongong

  Radio Frequency Identificatioin (RFID) technology has been widely applied in many applications, such as the supply chain and warehouse management. A typical RFID system… (more)

Subjects/Keywords: RFID security; authentication; security protocol; applied cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, N. (2015). Security and Privacy in RFID Systems. (Doctoral Dissertation). University of Wollongong. Retrieved from ; https://ro.uow.edu.au/theses/4481

Chicago Manual of Style (16th Edition):

Li, Nan. “Security and Privacy in RFID Systems.” 2015. Doctoral Dissertation, University of Wollongong. Accessed October 21, 2019. ; https://ro.uow.edu.au/theses/4481.

MLA Handbook (7th Edition):

Li, Nan. “Security and Privacy in RFID Systems.” 2015. Web. 21 Oct 2019.

Vancouver:

Li N. Security and Privacy in RFID Systems. [Internet] [Doctoral dissertation]. University of Wollongong; 2015. [cited 2019 Oct 21]. Available from: ; https://ro.uow.edu.au/theses/4481.

Council of Science Editors:

Li N. Security and Privacy in RFID Systems. [Doctoral Dissertation]. University of Wollongong; 2015. Available from: ; https://ro.uow.edu.au/theses/4481


Edith Cowan University

4. Shaw, David. An investigation into remote transactions.

Degree: 2012, Edith Cowan University

 Remote transactions globally transfer trillions of dollars annually. Many of these information exchanges are mediated, implicitly or explicitly, by a complex web of agencies that… (more)

Subjects/Keywords: Identification; Authentication; Verification; Transactions; Theory and Algorithms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shaw, D. (2012). An investigation into remote transactions. (Thesis). Edith Cowan University. Retrieved from https://ro.ecu.edu.au/theses/441

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shaw, David. “An investigation into remote transactions.” 2012. Thesis, Edith Cowan University. Accessed October 21, 2019. https://ro.ecu.edu.au/theses/441.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shaw, David. “An investigation into remote transactions.” 2012. Web. 21 Oct 2019.

Vancouver:

Shaw D. An investigation into remote transactions. [Internet] [Thesis]. Edith Cowan University; 2012. [cited 2019 Oct 21]. Available from: https://ro.ecu.edu.au/theses/441.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shaw D. An investigation into remote transactions. [Thesis]. Edith Cowan University; 2012. Available from: https://ro.ecu.edu.au/theses/441

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

5. Yang, Wencheng. Local Structure Based Fingerprint Authentication Systems with Template Protection.

Degree: Engineering & Information Technology, 2015, University of New South Wales

 Fingerprint authentication systems are widely used in military and civil applications due to the distinctiveness and stability that fingerprints can supply. Research in fingerprint authentication(more)

Subjects/Keywords: Template Protection; Local Structure; Fingerprint Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, W. (2015). Local Structure Based Fingerprint Authentication Systems with Template Protection. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/54755 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:35864/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Yang, Wencheng. “Local Structure Based Fingerprint Authentication Systems with Template Protection.” 2015. Doctoral Dissertation, University of New South Wales. Accessed October 21, 2019. http://handle.unsw.edu.au/1959.4/54755 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:35864/SOURCE02?view=true.

MLA Handbook (7th Edition):

Yang, Wencheng. “Local Structure Based Fingerprint Authentication Systems with Template Protection.” 2015. Web. 21 Oct 2019.

Vancouver:

Yang W. Local Structure Based Fingerprint Authentication Systems with Template Protection. [Internet] [Doctoral dissertation]. University of New South Wales; 2015. [cited 2019 Oct 21]. Available from: http://handle.unsw.edu.au/1959.4/54755 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:35864/SOURCE02?view=true.

Council of Science Editors:

Yang W. Local Structure Based Fingerprint Authentication Systems with Template Protection. [Doctoral Dissertation]. University of New South Wales; 2015. Available from: http://handle.unsw.edu.au/1959.4/54755 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:35864/SOURCE02?view=true


Queensland University of Technology

6. Alsolami, Eesa. An examination of keystroke dynamics for continuous user authentication.

Degree: 2012, Queensland University of Technology

 Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial… (more)

Subjects/Keywords: continuous biometric authentication; continuous authentication system; user-independent; threshold; keystroke dynamics; user typing behavior; feature selection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alsolami, E. (2012). An examination of keystroke dynamics for continuous user authentication. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/54730/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alsolami, Eesa. “An examination of keystroke dynamics for continuous user authentication.” 2012. Thesis, Queensland University of Technology. Accessed October 21, 2019. https://eprints.qut.edu.au/54730/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alsolami, Eesa. “An examination of keystroke dynamics for continuous user authentication.” 2012. Web. 21 Oct 2019.

Vancouver:

Alsolami E. An examination of keystroke dynamics for continuous user authentication. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2019 Oct 21]. Available from: https://eprints.qut.edu.au/54730/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alsolami E. An examination of keystroke dynamics for continuous user authentication. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/54730/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


RMIT University

7. Yau, S. Validation of dynamic signature for identity verification.

Degree: 2008, RMIT University

 Machine based identity validation is extremely important to determine the authenticity of documents, for financial transactions, and for e-communication. Recent explosion of frauds have demonstrated… (more)

Subjects/Keywords: Fields of Research; biometrics; authentication; signature; verification; identity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yau, S. (2008). Validation of dynamic signature for identity verification. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:6152

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yau, S. “Validation of dynamic signature for identity verification.” 2008. Thesis, RMIT University. Accessed October 21, 2019. http://researchbank.rmit.edu.au/view/rmit:6152.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yau, S. “Validation of dynamic signature for identity verification.” 2008. Web. 21 Oct 2019.

Vancouver:

Yau S. Validation of dynamic signature for identity verification. [Internet] [Thesis]. RMIT University; 2008. [cited 2019 Oct 21]. Available from: http://researchbank.rmit.edu.au/view/rmit:6152.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yau S. Validation of dynamic signature for identity verification. [Thesis]. RMIT University; 2008. Available from: http://researchbank.rmit.edu.au/view/rmit:6152

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Newcastle

8. Pranata, Ilung. Architecture for security and trust in digital environments (SecuTIDE).

Degree: PhD, 2014, University of Newcastle

Research Doctorate - Doctor of Philosophy (PhD)

Digital environments have long been considered an enabler for information sharing, electronic transactions, knowledge dissemination and online collaborations.… (more)

Subjects/Keywords: authentication; authorisation; trust; trust management system; online ratings; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pranata, I. (2014). Architecture for security and trust in digital environments (SecuTIDE). (Doctoral Dissertation). University of Newcastle. Retrieved from http://hdl.handle.net/1959.13/1040878

Chicago Manual of Style (16th Edition):

Pranata, Ilung. “Architecture for security and trust in digital environments (SecuTIDE).” 2014. Doctoral Dissertation, University of Newcastle. Accessed October 21, 2019. http://hdl.handle.net/1959.13/1040878.

MLA Handbook (7th Edition):

Pranata, Ilung. “Architecture for security and trust in digital environments (SecuTIDE).” 2014. Web. 21 Oct 2019.

Vancouver:

Pranata I. Architecture for security and trust in digital environments (SecuTIDE). [Internet] [Doctoral dissertation]. University of Newcastle; 2014. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/1959.13/1040878.

Council of Science Editors:

Pranata I. Architecture for security and trust in digital environments (SecuTIDE). [Doctoral Dissertation]. University of Newcastle; 2014. Available from: http://hdl.handle.net/1959.13/1040878


University of New South Wales

9. Sriskandaraja, Kaavya. Spoofing countermeasures for secure and robust voice authentication system: Feature extraction and modelling.

Degree: Electrical Engineering & Telecommunications, 2018, University of New South Wales

 The ability to employ automatic speaker verification systems without face-to-face contact makes them more prone to spoofing attacks compared to other biometric systems. The study… (more)

Subjects/Keywords: Spoofing countermeasures; Speech Processing; Speaker verification; Voice authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sriskandaraja, K. (2018). Spoofing countermeasures for secure and robust voice authentication system: Feature extraction and modelling. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/60356 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51915/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Sriskandaraja, Kaavya. “Spoofing countermeasures for secure and robust voice authentication system: Feature extraction and modelling.” 2018. Doctoral Dissertation, University of New South Wales. Accessed October 21, 2019. http://handle.unsw.edu.au/1959.4/60356 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51915/SOURCE02?view=true.

MLA Handbook (7th Edition):

Sriskandaraja, Kaavya. “Spoofing countermeasures for secure and robust voice authentication system: Feature extraction and modelling.” 2018. Web. 21 Oct 2019.

Vancouver:

Sriskandaraja K. Spoofing countermeasures for secure and robust voice authentication system: Feature extraction and modelling. [Internet] [Doctoral dissertation]. University of New South Wales; 2018. [cited 2019 Oct 21]. Available from: http://handle.unsw.edu.au/1959.4/60356 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51915/SOURCE02?view=true.

Council of Science Editors:

Sriskandaraja K. Spoofing countermeasures for secure and robust voice authentication system: Feature extraction and modelling. [Doctoral Dissertation]. University of New South Wales; 2018. Available from: http://handle.unsw.edu.au/1959.4/60356 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51915/SOURCE02?view=true


University of New South Wales

10. Javali, Chitra. Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics.

Degree: Computer Science & Engineering, 2017, University of New South Wales

 The tremendous development in wireless technology has lead to accessing abundant information at one's convenient location using hand-held and personal devices. Though the wireless medium… (more)

Subjects/Keywords: Location Proof; Physical layer security; Authentication; Secure pairing; Secret key generation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Javali, C. (2017). Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Javali, Chitra. “Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics.” 2017. Doctoral Dissertation, University of New South Wales. Accessed October 21, 2019. http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true.

MLA Handbook (7th Edition):

Javali, Chitra. “Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics.” 2017. Web. 21 Oct 2019.

Vancouver:

Javali C. Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2019 Oct 21]. Available from: http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true.

Council of Science Editors:

Javali C. Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/58401 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:45929/SOURCE02?view=true


RMIT University

11. Gu, L. Improved internet protocol multimedia subsystem authentication for long term evolution.

Degree: 2011, RMIT University

 Long Term Evolution (LTE) is a major technology to be used in the 4th generation (4G) mobile network and the core network is evolving towards… (more)

Subjects/Keywords: Earth Sciences; 4G; Authentication; IP Multimedia Subsystem (IMS); Long Term Evolution (LTE); Authentication and Key Agreement (AKA); ession Initiation Protocol (SIP); Call Session Control Function (CSCF)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gu, L. (2011). Improved internet protocol multimedia subsystem authentication for long term evolution. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:160029

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gu, L. “Improved internet protocol multimedia subsystem authentication for long term evolution.” 2011. Thesis, RMIT University. Accessed October 21, 2019. http://researchbank.rmit.edu.au/view/rmit:160029.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gu, L. “Improved internet protocol multimedia subsystem authentication for long term evolution.” 2011. Web. 21 Oct 2019.

Vancouver:

Gu L. Improved internet protocol multimedia subsystem authentication for long term evolution. [Internet] [Thesis]. RMIT University; 2011. [cited 2019 Oct 21]. Available from: http://researchbank.rmit.edu.au/view/rmit:160029.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gu L. Improved internet protocol multimedia subsystem authentication for long term evolution. [Thesis]. RMIT University; 2011. Available from: http://researchbank.rmit.edu.au/view/rmit:160029

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


RMIT University

12. Marks, D. The evolution of the Kuna Mola: From cultural authentication to cultural survival.

Degree: 2012, RMIT University

 The San Blas Kuna Indians, an American Indian indigenous people, live in an autonomous territory in Panama and are considered to be a micro island… (more)

Subjects/Keywords: Fields of Research; cultural authentication; cultural survival; Kuna mola blouses; visual analysis; invention for tradition; museum collections; serious leisure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marks, D. (2012). The evolution of the Kuna Mola: From cultural authentication to cultural survival. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:161485

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Marks, D. “The evolution of the Kuna Mola: From cultural authentication to cultural survival.” 2012. Thesis, RMIT University. Accessed October 21, 2019. http://researchbank.rmit.edu.au/view/rmit:161485.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Marks, D. “The evolution of the Kuna Mola: From cultural authentication to cultural survival.” 2012. Web. 21 Oct 2019.

Vancouver:

Marks D. The evolution of the Kuna Mola: From cultural authentication to cultural survival. [Internet] [Thesis]. RMIT University; 2012. [cited 2019 Oct 21]. Available from: http://researchbank.rmit.edu.au/view/rmit:161485.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Marks D. The evolution of the Kuna Mola: From cultural authentication to cultural survival. [Thesis]. RMIT University; 2012. Available from: http://researchbank.rmit.edu.au/view/rmit:161485

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

13. Djamaludin, Christopher I. Decentralised key management for delay tolerant networks.

Degree: 2016, Queensland University of Technology

 Public key authentication is the verification of the identity-public key binding, and is foundational to the security of any network. The contribution of this thesis… (more)

Subjects/Keywords: Delay Tolerant Network; Decentralised; Public Key Infrastructure; Public Key Authentication; Key Management; Key Distribution; Key Revocation; Autonomous; Trust; Reputation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Djamaludin, C. I. (2016). Decentralised key management for delay tolerant networks. (Thesis). Queensland University of Technology. Retrieved from http://eprints.qut.edu.au/94983/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Djamaludin, Christopher I. “Decentralised key management for delay tolerant networks.” 2016. Thesis, Queensland University of Technology. Accessed October 21, 2019. http://eprints.qut.edu.au/94983/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Djamaludin, Christopher I. “Decentralised key management for delay tolerant networks.” 2016. Web. 21 Oct 2019.

Vancouver:

Djamaludin CI. Decentralised key management for delay tolerant networks. [Internet] [Thesis]. Queensland University of Technology; 2016. [cited 2019 Oct 21]. Available from: http://eprints.qut.edu.au/94983/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Djamaludin CI. Decentralised key management for delay tolerant networks. [Thesis]. Queensland University of Technology; 2016. Available from: http://eprints.qut.edu.au/94983/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

14. Nyeem, Hussain Md Abu. A digital watermarking framework with application to medical image security.

Degree: 2014, Queensland University of Technology

 Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include… (more)

Subjects/Keywords: Watermarking model; Attack model; Content authentication; Counterfeiting attack; Tampering detection; Security; Medical Image; Capacity control framework; Fragile watermarking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nyeem, H. M. A. (2014). A digital watermarking framework with application to medical image security. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/74749/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nyeem, Hussain Md Abu. “A digital watermarking framework with application to medical image security.” 2014. Thesis, Queensland University of Technology. Accessed October 21, 2019. https://eprints.qut.edu.au/74749/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nyeem, Hussain Md Abu. “A digital watermarking framework with application to medical image security.” 2014. Web. 21 Oct 2019.

Vancouver:

Nyeem HMA. A digital watermarking framework with application to medical image security. [Internet] [Thesis]. Queensland University of Technology; 2014. [cited 2019 Oct 21]. Available from: https://eprints.qut.edu.au/74749/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nyeem HMA. A digital watermarking framework with application to medical image security. [Thesis]. Queensland University of Technology; 2014. Available from: https://eprints.qut.edu.au/74749/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Adelaide

15. Brown, George Maxwell. Academic qualification acceptability and authenticity : a comparative risk assessment of approaches employed by the recruitment and higher education sectors of Australia.

Degree: 2007, University of Adelaide

 To investigate the extent of the problem of use of fraudulent academic qualifications in Australia, the study used two approaches under the theoretical framework of… (more)

Subjects/Keywords: college student records forgeries; false certification Australia; authentication Australia

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brown, G. M. (2007). Academic qualification acceptability and authenticity : a comparative risk assessment of approaches employed by the recruitment and higher education sectors of Australia. (Thesis). University of Adelaide. Retrieved from http://hdl.handle.net/2440/57111

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Brown, George Maxwell. “Academic qualification acceptability and authenticity : a comparative risk assessment of approaches employed by the recruitment and higher education sectors of Australia.” 2007. Thesis, University of Adelaide. Accessed October 21, 2019. http://hdl.handle.net/2440/57111.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Brown, George Maxwell. “Academic qualification acceptability and authenticity : a comparative risk assessment of approaches employed by the recruitment and higher education sectors of Australia.” 2007. Web. 21 Oct 2019.

Vancouver:

Brown GM. Academic qualification acceptability and authenticity : a comparative risk assessment of approaches employed by the recruitment and higher education sectors of Australia. [Internet] [Thesis]. University of Adelaide; 2007. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/2440/57111.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Brown GM. Academic qualification acceptability and authenticity : a comparative risk assessment of approaches employed by the recruitment and higher education sectors of Australia. [Thesis]. University of Adelaide; 2007. Available from: http://hdl.handle.net/2440/57111

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

16. Amoah, Raphael. Formal security analysis of the DNP3-Secure Authentication Protocol.

Degree: 2016, Queensland University of Technology

 This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically,… (more)

Subjects/Keywords: Industrial Control Systems (ICS); Smart grids; Supervisory Control and Data Acquisition (SCADA); Distributed Network Protocol version 3 (DNP3); Secure Authentication (DNP3-SA); Secure Authentication for Broadcast (DNP3-SAB); Formal Methods; Coloured Petri Nets (CPN); State Space Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Amoah, R. (2016). Formal security analysis of the DNP3-Secure Authentication Protocol. (Thesis). Queensland University of Technology. Retrieved from http://eprints.qut.edu.au/93798/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Amoah, Raphael. “Formal security analysis of the DNP3-Secure Authentication Protocol.” 2016. Thesis, Queensland University of Technology. Accessed October 21, 2019. http://eprints.qut.edu.au/93798/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Amoah, Raphael. “Formal security analysis of the DNP3-Secure Authentication Protocol.” 2016. Web. 21 Oct 2019.

Vancouver:

Amoah R. Formal security analysis of the DNP3-Secure Authentication Protocol. [Internet] [Thesis]. Queensland University of Technology; 2016. [cited 2019 Oct 21]. Available from: http://eprints.qut.edu.au/93798/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Amoah R. Formal security analysis of the DNP3-Secure Authentication Protocol. [Thesis]. Queensland University of Technology; 2016. Available from: http://eprints.qut.edu.au/93798/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

17. Jan, Mian Ahmad. Energy-efficient routing and secure communication in wireless sensor networks.

Degree: 2016, University of Technology, Sydney

 Wireless Sensor Networks (WSNs) consist of miniature sensor nodes deployed to gather vital information about an area of interest. The ability of these networks to… (more)

Subjects/Keywords: Wireless Sensor Networks (WSNs).; Energy-efficient routing protocols.; Energy conservation.; Optimal percentage of cluster heads.; Sybil attack detection in WSN.; Lightweight and robust mutual authentication scheme.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jan, M. A. (2016). Energy-efficient routing and secure communication in wireless sensor networks. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/43497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jan, Mian Ahmad. “Energy-efficient routing and secure communication in wireless sensor networks.” 2016. Thesis, University of Technology, Sydney. Accessed October 21, 2019. http://hdl.handle.net/10453/43497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jan, Mian Ahmad. “Energy-efficient routing and secure communication in wireless sensor networks.” 2016. Web. 21 Oct 2019.

Vancouver:

Jan MA. Energy-efficient routing and secure communication in wireless sensor networks. [Internet] [Thesis]. University of Technology, Sydney; 2016. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/10453/43497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jan MA. Energy-efficient routing and secure communication in wireless sensor networks. [Thesis]. University of Technology, Sydney; 2016. Available from: http://hdl.handle.net/10453/43497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Camtepe, Seyit A. Kerberos based security system for session initiation protocol.

Degree: 2001, Bogazici University, Computer Engineering Department

 Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be… (more)

Subjects/Keywords: 080303 Computer System Security; Kerberos; Session Initiation Protocol; Authentication; Single Sign-On

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Camtepe, S. A. (2001). Kerberos based security system for session initiation protocol. (Thesis). Bogazici University, Computer Engineering Department. Retrieved from http://eprints.qut.edu.au/58487/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Camtepe, Seyit A. “Kerberos based security system for session initiation protocol.” 2001. Thesis, Bogazici University, Computer Engineering Department. Accessed October 21, 2019. http://eprints.qut.edu.au/58487/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Camtepe, Seyit A. “Kerberos based security system for session initiation protocol.” 2001. Web. 21 Oct 2019.

Vancouver:

Camtepe SA. Kerberos based security system for session initiation protocol. [Internet] [Thesis]. Bogazici University, Computer Engineering Department; 2001. [cited 2019 Oct 21]. Available from: http://eprints.qut.edu.au/58487/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Camtepe SA. Kerberos based security system for session initiation protocol. [Thesis]. Bogazici University, Computer Engineering Department; 2001. Available from: http://eprints.qut.edu.au/58487/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

19. Kuppusamy, Lakshmi Devi. Modelling client puzzles and denial-of-service resistant protocols.

Degree: 2012, Queensland University of Technology

 Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled… (more)

Subjects/Keywords: denial-of-service; client puzzles; message authentication codes; pseudo-random function; hash function; authenticated key exchange; meadows' cost-based framework; random Oracle model; standard model; denial-of-service resistant protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuppusamy, L. D. (2012). Modelling client puzzles and denial-of-service resistant protocols. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/61032/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuppusamy, Lakshmi Devi. “Modelling client puzzles and denial-of-service resistant protocols.” 2012. Thesis, Queensland University of Technology. Accessed October 21, 2019. https://eprints.qut.edu.au/61032/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuppusamy, Lakshmi Devi. “Modelling client puzzles and denial-of-service resistant protocols.” 2012. Web. 21 Oct 2019.

Vancouver:

Kuppusamy LD. Modelling client puzzles and denial-of-service resistant protocols. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2019 Oct 21]. Available from: https://eprints.qut.edu.au/61032/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuppusamy LD. Modelling client puzzles and denial-of-service resistant protocols. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/61032/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

20. Alzomai, Mohammed Hamad. Identity management : strengthening one-time password authentication through usability.

Degree: 2011, Queensland University of Technology

 Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site… (more)

Subjects/Keywords: security; usability; identity management; authentication; authorization; scalability; online banking; password; one-time-password; hardware token; software token; trusted computing; display security; sms; mobile phone; cellular network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alzomai, M. H. (2011). Identity management : strengthening one-time password authentication through usability. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/46213/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alzomai, Mohammed Hamad. “Identity management : strengthening one-time password authentication through usability.” 2011. Thesis, Queensland University of Technology. Accessed October 21, 2019. https://eprints.qut.edu.au/46213/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alzomai, Mohammed Hamad. “Identity management : strengthening one-time password authentication through usability.” 2011. Web. 21 Oct 2019.

Vancouver:

Alzomai MH. Identity management : strengthening one-time password authentication through usability. [Internet] [Thesis]. Queensland University of Technology; 2011. [cited 2019 Oct 21]. Available from: https://eprints.qut.edu.au/46213/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alzomai MH. Identity management : strengthening one-time password authentication through usability. [Thesis]. Queensland University of Technology; 2011. Available from: https://eprints.qut.edu.au/46213/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Southern Cross University

21. Coles, George Michael. Privacy, confidentiality, trust and security in e-health informatics systems.

Degree: 2018, Southern Cross University

 This thesis examines patient attitudes related to the use of Attribute-Based Credentials (ABCs) for online authentication, authorisation and access control to the Australian Personally Controlled… (more)

Subjects/Keywords: Attribute-based credentials; privacy; security; e-health records; authentication; authorisation; access control; PCEHR; Business Administration, Management, and Operations; Health and Medical Administration; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coles, G. M. (2018). Privacy, confidentiality, trust and security in e-health informatics systems. (Thesis). Southern Cross University. Retrieved from https://epubs.scu.edu.au/theses/637

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coles, George Michael. “Privacy, confidentiality, trust and security in e-health informatics systems.” 2018. Thesis, Southern Cross University. Accessed October 21, 2019. https://epubs.scu.edu.au/theses/637.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coles, George Michael. “Privacy, confidentiality, trust and security in e-health informatics systems.” 2018. Web. 21 Oct 2019.

Vancouver:

Coles GM. Privacy, confidentiality, trust and security in e-health informatics systems. [Internet] [Thesis]. Southern Cross University; 2018. [cited 2019 Oct 21]. Available from: https://epubs.scu.edu.au/theses/637.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coles GM. Privacy, confidentiality, trust and security in e-health informatics systems. [Thesis]. Southern Cross University; 2018. Available from: https://epubs.scu.edu.au/theses/637

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

22. Tan, Hailun. Secure network programming in wireless sensor networks.

Degree: Computer Science & Engineering, 2010, University of New South Wales

 Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on… (more)

Subjects/Keywords: Network Programming; Broadcast Authentication; Wireless Sensor Network; Code Dissemination; Trusted Platform Module; Sensor Worm Attack; Wormhole Attack; Remote Attestation; Secure Network Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, H. (2010). Secure network programming in wireless sensor networks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Tan, Hailun. “Secure network programming in wireless sensor networks.” 2010. Doctoral Dissertation, University of New South Wales. Accessed October 21, 2019. http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true.

MLA Handbook (7th Edition):

Tan, Hailun. “Secure network programming in wireless sensor networks.” 2010. Web. 21 Oct 2019.

Vancouver:

Tan H. Secure network programming in wireless sensor networks. [Internet] [Doctoral dissertation]. University of New South Wales; 2010. [cited 2019 Oct 21]. Available from: http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true.

Council of Science Editors:

Tan H. Secure network programming in wireless sensor networks. [Doctoral Dissertation]. University of New South Wales; 2010. Available from: http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true


Queensland University of Technology

23. Woo, Chaw-Seng. Digital image watermarking methods for copyright protection and authentication.

Degree: 2007, Queensland University of Technology

 The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia enables protection mechanism in decrypted… (more)

Subjects/Keywords: digital watermark; image watermark; robust watermark; semi-fragile watermark; hybrid watermark; copyright protection; content authentication; tamper detection; tamper localization; self-embedding; self-authentication; self-recovery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Woo, C. (2007). Digital image watermarking methods for copyright protection and authentication. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/16457/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Woo, Chaw-Seng. “Digital image watermarking methods for copyright protection and authentication.” 2007. Thesis, Queensland University of Technology. Accessed October 21, 2019. https://eprints.qut.edu.au/16457/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Woo, Chaw-Seng. “Digital image watermarking methods for copyright protection and authentication.” 2007. Web. 21 Oct 2019.

Vancouver:

Woo C. Digital image watermarking methods for copyright protection and authentication. [Internet] [Thesis]. Queensland University of Technology; 2007. [cited 2019 Oct 21]. Available from: https://eprints.qut.edu.au/16457/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Woo C. Digital image watermarking methods for copyright protection and authentication. [Thesis]. Queensland University of Technology; 2007. Available from: https://eprints.qut.edu.au/16457/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Al-Ibrahim, Mohamed Hussain. Source authentication in group communication.

Degree: PhD, 2005, Macquarie University, Division of Information and Communication Sciences, Dept. of Computing

Bibliography: leaves 163-175.

Introduction  – Cryptographic essentials  – Multicast: structure and security  – Authentication of multicast streams  – Authentication of concast communication  – Authentication(more)

Subjects/Keywords: Authentication; Digital signatures; Computer networks  – Security measures; Data encryption (Computer science); Computers  – Access control; Cryptography; Computer security; Computer network protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Ibrahim, M. H. (2005). Source authentication in group communication. (Doctoral Dissertation). Macquarie University, Division of Information and Communication Sciences, Dept. of Computing. Retrieved from http://hdl.handle.net/1959.14/549

Chicago Manual of Style (16th Edition):

Al-Ibrahim, Mohamed Hussain. “Source authentication in group communication.” 2005. Doctoral Dissertation, Macquarie University, Division of Information and Communication Sciences, Dept. of Computing. Accessed October 21, 2019. http://hdl.handle.net/1959.14/549.

MLA Handbook (7th Edition):

Al-Ibrahim, Mohamed Hussain. “Source authentication in group communication.” 2005. Web. 21 Oct 2019.

Vancouver:

Al-Ibrahim MH. Source authentication in group communication. [Internet] [Doctoral dissertation]. Macquarie University, Division of Information and Communication Sciences, Dept. of Computing; 2005. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/1959.14/549.

Council of Science Editors:

Al-Ibrahim MH. Source authentication in group communication. [Doctoral Dissertation]. Macquarie University, Division of Information and Communication Sciences, Dept. of Computing; 2005. Available from: http://hdl.handle.net/1959.14/549


Queensland University of Technology

25. Gorantla, Malakondayya Choudary. Design and analysis of group key exchange protocols.

Degree: 2010, Queensland University of Technology

 A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this… (more)

Subjects/Keywords: authenticated key exchange, group key exchange, forward secrecy, forward security, key evolving, key compromise impersonation resilience, mutual authentication, contributiveness, universal composability, attribute-based cryptography, random oracle model; generic group model, standard model, key encapsulation mechanism, multi key encapsulation mechanism; ODTA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gorantla, M. C. (2010). Design and analysis of group key exchange protocols. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/37664/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gorantla, Malakondayya Choudary. “Design and analysis of group key exchange protocols.” 2010. Thesis, Queensland University of Technology. Accessed October 21, 2019. https://eprints.qut.edu.au/37664/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gorantla, Malakondayya Choudary. “Design and analysis of group key exchange protocols.” 2010. Web. 21 Oct 2019.

Vancouver:

Gorantla MC. Design and analysis of group key exchange protocols. [Internet] [Thesis]. Queensland University of Technology; 2010. [cited 2019 Oct 21]. Available from: https://eprints.qut.edu.au/37664/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gorantla MC. Design and analysis of group key exchange protocols. [Thesis]. Queensland University of Technology; 2010. Available from: https://eprints.qut.edu.au/37664/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

26. Clutterbuck, Peter. Maximizing the Availability of Distributed Software Services.

Degree: 2005, Queensland University of Technology

 In a commercial Internet environment, the quality of service experienced by a user is critical to competitive advantage and business survivability. The availability and response… (more)

Subjects/Keywords: Availability; denial of service; wait time; replication; cluster; distributed service; trust; authentication; redirection; dispatching; scheduling; filtering; option

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Clutterbuck, P. (2005). Maximizing the Availability of Distributed Software Services. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/16134/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Clutterbuck, Peter. “Maximizing the Availability of Distributed Software Services.” 2005. Thesis, Queensland University of Technology. Accessed October 21, 2019. https://eprints.qut.edu.au/16134/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Clutterbuck, Peter. “Maximizing the Availability of Distributed Software Services.” 2005. Web. 21 Oct 2019.

Vancouver:

Clutterbuck P. Maximizing the Availability of Distributed Software Services. [Internet] [Thesis]. Queensland University of Technology; 2005. [cited 2019 Oct 21]. Available from: https://eprints.qut.edu.au/16134/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Clutterbuck P. Maximizing the Availability of Distributed Software Services. [Thesis]. Queensland University of Technology; 2005. Available from: https://eprints.qut.edu.au/16134/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

27. Park, DongGook. Cryptographic protocols for third generation mobile communication systems.

Degree: 2001, Queensland University of Technology

Subjects/Keywords: Cryptography; Computer network protocols; Mobile communication systems; Computers Access control; authentication; key establishment; authentication model; formal analysis; forward secrecy; key recovery; key escrow; WAKE protocol; denial-of-service attack; electronic commerce; mobile security; mobile communication security; UMTS; IMT-2000; IS-41C; GSM; thesis; doctoral

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Park, D. (2001). Cryptographic protocols for third generation mobile communication systems. (Thesis). Queensland University of Technology. Retrieved from http://eprints.qut.edu.au/36868/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Park, DongGook. “Cryptographic protocols for third generation mobile communication systems.” 2001. Thesis, Queensland University of Technology. Accessed October 21, 2019. http://eprints.qut.edu.au/36868/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Park, DongGook. “Cryptographic protocols for third generation mobile communication systems.” 2001. Web. 21 Oct 2019.

Vancouver:

Park D. Cryptographic protocols for third generation mobile communication systems. [Internet] [Thesis]. Queensland University of Technology; 2001. [cited 2019 Oct 21]. Available from: http://eprints.qut.edu.au/36868/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Park D. Cryptographic protocols for third generation mobile communication systems. [Thesis]. Queensland University of Technology; 2001. Available from: http://eprints.qut.edu.au/36868/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

28. Rangasamy, Jothi Ramalingam. Cryptographic techniques for managing computational effort.

Degree: 2012, Queensland University of Technology

 Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential… (more)

Subjects/Keywords: denial-of-service, denial-of-service resilience, cryptographic puzzles, time-lock puzzles, puzzle-unforgeability, puzzle-diculty, non-parallelisability, mutual authentication, bernstein's signatures, secure sockets layer (ssl), public-key encryptionript:; timed-release encryption, key encapsulation mechanism, data encapsulation mechanism, encapsulated key escrow, ciphertext indistinguishability under chosen plaintext attacks and adaptive chosen ciphertext attacks, random Oracle model, standard model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rangasamy, J. R. (2012). Cryptographic techniques for managing computational effort. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/61007/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rangasamy, Jothi Ramalingam. “Cryptographic techniques for managing computational effort.” 2012. Thesis, Queensland University of Technology. Accessed October 21, 2019. https://eprints.qut.edu.au/61007/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rangasamy, Jothi Ramalingam. “Cryptographic techniques for managing computational effort.” 2012. Web. 21 Oct 2019.

Vancouver:

Rangasamy JR. Cryptographic techniques for managing computational effort. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2019 Oct 21]. Available from: https://eprints.qut.edu.au/61007/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rangasamy JR. Cryptographic techniques for managing computational effort. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/61007/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Queensland

29. Smith, Daniel F. Countering digital replay attacks for face verification on consumer smart devices using structured illumination.

Degree: School of Information Technology and Electrical Engineering, 2016, University of Queensland

Subjects/Keywords: Anti-spoofing; Biometrics; Challenge-response; Digital replay attack; Face recognition; Face verification; Online authentication; Cybersecurity; Consumer smart device; Structured illumination; 080106 Image Processing; 080303 Computer System Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, D. F. (2016). Countering digital replay attacks for face verification on consumer smart devices using structured illumination. (Thesis). University of Queensland. Retrieved from http://espace.library.uq.edu.au/view/UQ:385898

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Daniel F. “Countering digital replay attacks for face verification on consumer smart devices using structured illumination.” 2016. Thesis, University of Queensland. Accessed October 21, 2019. http://espace.library.uq.edu.au/view/UQ:385898.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Daniel F. “Countering digital replay attacks for face verification on consumer smart devices using structured illumination.” 2016. Web. 21 Oct 2019.

Vancouver:

Smith DF. Countering digital replay attacks for face verification on consumer smart devices using structured illumination. [Internet] [Thesis]. University of Queensland; 2016. [cited 2019 Oct 21]. Available from: http://espace.library.uq.edu.au/view/UQ:385898.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith DF. Countering digital replay attacks for face verification on consumer smart devices using structured illumination. [Thesis]. University of Queensland; 2016. Available from: http://espace.library.uq.edu.au/view/UQ:385898

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

30. Tan, Teewoon. HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING .

Degree: 2003, University of Sydney

 Human face recognition is an important area in the field of biometrics. It has been an active area of research for several decades, but still… (more)

Subjects/Keywords: human face recognition; fractal image coding; fractal neighbour distance; FND; face identification; face verification; face authentication; face detection; eye detection; support vector machine

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, T. (2003). HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/586

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tan, Teewoon. “HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING .” 2003. Thesis, University of Sydney. Accessed October 21, 2019. http://hdl.handle.net/2123/586.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tan, Teewoon. “HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING .” 2003. Web. 21 Oct 2019.

Vancouver:

Tan T. HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING . [Internet] [Thesis]. University of Sydney; 2003. [cited 2019 Oct 21]. Available from: http://hdl.handle.net/2123/586.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tan T. HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING . [Thesis]. University of Sydney; 2003. Available from: http://hdl.handle.net/2123/586

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.