Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(key measures). Showing records 1 – 30 of 31 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Hong Kong

1. 郭漢文.; Kwok, Hon-man, Sammy. A scalable and secure networking paradigm using identity-based cryptography.

Degree: PhD, 2011, University of Hong Kong

published_or_final_version

Electrical and Electronic Engineering

Doctoral

Doctor of Philosophy

Advisors/Committee Members: Lam, EYM, So, HKH.

Subjects/Keywords: Public key cryptography.; Computer networks - Security measures.; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

郭漢文.; Kwok, Hon-man, S. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Doctoral Dissertation). University of Hong Kong. Retrieved from Kwok, H. S. [郭漢文]. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4697171 ; http://dx.doi.org/10.5353/th_b4697171 ; http://hdl.handle.net/10722/144779

Chicago Manual of Style (16th Edition):

郭漢文.; Kwok, Hon-man, Sammy. “A scalable and secure networking paradigm using identity-based cryptography.” 2011. Doctoral Dissertation, University of Hong Kong. Accessed January 23, 2020. Kwok, H. S. [郭漢文]. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4697171 ; http://dx.doi.org/10.5353/th_b4697171 ; http://hdl.handle.net/10722/144779.

MLA Handbook (7th Edition):

郭漢文.; Kwok, Hon-man, Sammy. “A scalable and secure networking paradigm using identity-based cryptography.” 2011. Web. 23 Jan 2020.

Vancouver:

郭漢文.; Kwok, Hon-man S. A scalable and secure networking paradigm using identity-based cryptography. [Internet] [Doctoral dissertation]. University of Hong Kong; 2011. [cited 2020 Jan 23]. Available from: Kwok, H. S. [郭漢文]. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4697171 ; http://dx.doi.org/10.5353/th_b4697171 ; http://hdl.handle.net/10722/144779.

Council of Science Editors:

郭漢文.; Kwok, Hon-man S. A scalable and secure networking paradigm using identity-based cryptography. [Doctoral Dissertation]. University of Hong Kong; 2011. Available from: Kwok, H. S. [郭漢文]. (2011). A scalable and secure networking paradigm using identity-based cryptography. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4697171 ; http://dx.doi.org/10.5353/th_b4697171 ; http://hdl.handle.net/10722/144779


Stellenbosch University

2. Coetzee, Johannes Gerhardus. Performance measures : preventive strategies to limit negative secondary behaviour induced in selected incentive-based companies.

Degree: 2009, Stellenbosch University

Mini-research report presented in partial fulfillment of the requirements for the degree of Master of Business Administration at the University of Stellenbosch.

ENGLISH ABSTRACT: This… (more)

Subjects/Keywords: Performance measures; Key performance indicators; Performance management systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coetzee, J. G. (2009). Performance measures : preventive strategies to limit negative secondary behaviour induced in selected incentive-based companies. (Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/5035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coetzee, Johannes Gerhardus. “Performance measures : preventive strategies to limit negative secondary behaviour induced in selected incentive-based companies.” 2009. Thesis, Stellenbosch University. Accessed January 23, 2020. http://hdl.handle.net/10019.1/5035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coetzee, Johannes Gerhardus. “Performance measures : preventive strategies to limit negative secondary behaviour induced in selected incentive-based companies.” 2009. Web. 23 Jan 2020.

Vancouver:

Coetzee JG. Performance measures : preventive strategies to limit negative secondary behaviour induced in selected incentive-based companies. [Internet] [Thesis]. Stellenbosch University; 2009. [cited 2020 Jan 23]. Available from: http://hdl.handle.net/10019.1/5035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coetzee JG. Performance measures : preventive strategies to limit negative secondary behaviour induced in selected incentive-based companies. [Thesis]. Stellenbosch University; 2009. Available from: http://hdl.handle.net/10019.1/5035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Open Universiteit Nederland

3. Scholten, C.F. Specification, Modeling and Validation of KPIs and their Required Properties .

Degree: 2017, Open Universiteit Nederland

 A ‘Key Performance Indicator’ (KPI) is defined as “a metric used to quantify the efficiency and/or effectiveness of an action that is compared to a… (more)

Subjects/Keywords: requirements; properties; characteristics; performance measures; performance indicators; key performance indicators (KPIs); events; object-lifecycles

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Scholten, C. F. (2017). Specification, Modeling and Validation of KPIs and their Required Properties . (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/9332

Chicago Manual of Style (16th Edition):

Scholten, C F. “Specification, Modeling and Validation of KPIs and their Required Properties .” 2017. Masters Thesis, Open Universiteit Nederland. Accessed January 23, 2020. http://hdl.handle.net/1820/9332.

MLA Handbook (7th Edition):

Scholten, C F. “Specification, Modeling and Validation of KPIs and their Required Properties .” 2017. Web. 23 Jan 2020.

Vancouver:

Scholten CF. Specification, Modeling and Validation of KPIs and their Required Properties . [Internet] [Masters thesis]. Open Universiteit Nederland; 2017. [cited 2020 Jan 23]. Available from: http://hdl.handle.net/1820/9332.

Council of Science Editors:

Scholten CF. Specification, Modeling and Validation of KPIs and their Required Properties . [Masters Thesis]. Open Universiteit Nederland; 2017. Available from: http://hdl.handle.net/1820/9332


Univerzitet u Beogradu

4. Boltić, Zorana. Obezbeđenje kvaliteta i uvođenje čistije proizvodnje u generičkoj farmaceutskoj industriji.

Degree: Tehnološko-metalurški fakultet, 2015, Univerzitet u Beogradu

Datum odbrane: 30.11.2013

Predmet i cilj istraživanja doktorske disertacije je postavljanje indikatora za merenje performansi u oblasti obezbeđenja kvaliteta, kao važan parametar sveobuhvatnog koncepta stalnog… (more)

Subjects/Keywords: performance measures; pharmaceutical quality system; deviation management; key performance indicators; tablet coating; BAT; VOCs emission

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boltić, Z. (2015). Obezbeđenje kvaliteta i uvođenje čistije proizvodnje u generičkoj farmaceutskoj industriji. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:9067/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Boltić, Zorana. “Obezbeđenje kvaliteta i uvođenje čistije proizvodnje u generičkoj farmaceutskoj industriji.” 2015. Thesis, Univerzitet u Beogradu. Accessed January 23, 2020. https://fedorabg.bg.ac.rs/fedora/get/o:9067/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Boltić, Zorana. “Obezbeđenje kvaliteta i uvođenje čistije proizvodnje u generičkoj farmaceutskoj industriji.” 2015. Web. 23 Jan 2020.

Vancouver:

Boltić Z. Obezbeđenje kvaliteta i uvođenje čistije proizvodnje u generičkoj farmaceutskoj industriji. [Internet] [Thesis]. Univerzitet u Beogradu; 2015. [cited 2020 Jan 23]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:9067/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Boltić Z. Obezbeđenje kvaliteta i uvođenje čistije proizvodnje u generičkoj farmaceutskoj industriji. [Thesis]. Univerzitet u Beogradu; 2015. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:9067/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Ghanem, Sahar Mohamed. A Framework for Secure Group Key Management.

Degree: PhD, Computer Science, 2004, Old Dominion University

  The need for secure group communication is increasingly evident in a wide variety of governmental, commercial, and Internet communities. Secure group key management is… (more)

Subjects/Keywords: Group key; Logical key hierarchy; Secure communication; Security measures; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghanem, S. M. (2004). A Framework for Secure Group Key Management. (Doctoral Dissertation). Old Dominion University. Retrieved from https://digitalcommons.odu.edu/computerscience_etds/55

Chicago Manual of Style (16th Edition):

Ghanem, Sahar Mohamed. “A Framework for Secure Group Key Management.” 2004. Doctoral Dissertation, Old Dominion University. Accessed January 23, 2020. https://digitalcommons.odu.edu/computerscience_etds/55.

MLA Handbook (7th Edition):

Ghanem, Sahar Mohamed. “A Framework for Secure Group Key Management.” 2004. Web. 23 Jan 2020.

Vancouver:

Ghanem SM. A Framework for Secure Group Key Management. [Internet] [Doctoral dissertation]. Old Dominion University; 2004. [cited 2020 Jan 23]. Available from: https://digitalcommons.odu.edu/computerscience_etds/55.

Council of Science Editors:

Ghanem SM. A Framework for Secure Group Key Management. [Doctoral Dissertation]. Old Dominion University; 2004. Available from: https://digitalcommons.odu.edu/computerscience_etds/55


University of Hong Kong

6. Cheung, Lai-sze. Delegation of rights using PKI-based components.

Degree: M. Phil., 2004, University of Hong Kong

toc

published_or_final_version

abstract

Computer Science

Master

Master of Philosophy

Advisors/Committee Members: Hui, CK.

Subjects/Keywords: Computer security.; Internet - Security measures.; Public key cryptography.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheung, L. (2004). Delegation of rights using PKI-based components. (Masters Thesis). University of Hong Kong. Retrieved from Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428

Chicago Manual of Style (16th Edition):

Cheung, Lai-sze. “Delegation of rights using PKI-based components.” 2004. Masters Thesis, University of Hong Kong. Accessed January 23, 2020. Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428.

MLA Handbook (7th Edition):

Cheung, Lai-sze. “Delegation of rights using PKI-based components.” 2004. Web. 23 Jan 2020.

Vancouver:

Cheung L. Delegation of rights using PKI-based components. [Internet] [Masters thesis]. University of Hong Kong; 2004. [cited 2020 Jan 23]. Available from: Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428.

Council of Science Editors:

Cheung L. Delegation of rights using PKI-based components. [Masters Thesis]. University of Hong Kong; 2004. Available from: Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428


Florida Atlantic University

7. Neupane, Kashi. Design and analysis of key establishment protocols.

Degree: PhD, 2012, Florida Atlantic University

Summary: Consider a scenario where a server S shares a symmetric key kU with each user U. Building on a 2-party solution of Bohli et… (more)

Subjects/Keywords: Computer networks – Security measures; Computer network protocols; Data encryption (Computer science); Public key infrastructure (Computer security)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Neupane, K. (2012). Design and analysis of key establishment protocols. (Doctoral Dissertation). Florida Atlantic University. Retrieved from http://purl.flvc.org/FAU/3342239

Chicago Manual of Style (16th Edition):

Neupane, Kashi. “Design and analysis of key establishment protocols.” 2012. Doctoral Dissertation, Florida Atlantic University. Accessed January 23, 2020. http://purl.flvc.org/FAU/3342239.

MLA Handbook (7th Edition):

Neupane, Kashi. “Design and analysis of key establishment protocols.” 2012. Web. 23 Jan 2020.

Vancouver:

Neupane K. Design and analysis of key establishment protocols. [Internet] [Doctoral dissertation]. Florida Atlantic University; 2012. [cited 2020 Jan 23]. Available from: http://purl.flvc.org/FAU/3342239.

Council of Science Editors:

Neupane K. Design and analysis of key establishment protocols. [Doctoral Dissertation]. Florida Atlantic University; 2012. Available from: http://purl.flvc.org/FAU/3342239


Hong Kong University of Science and Technology

8. Ip, Epsilon Kin Fai. Security analysis of public key certificate issuance protocols over Internet and wireless networks.

Degree: 2000, Hong Kong University of Science and Technology

 Since the early 1990s public-key certificate issuance has involved verifying users' identities and public keys over a separate-and presumably secure-channel, such as in person or… (more)

Subjects/Keywords: Public key cryptography ; Internet  – Security measures ; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ip, E. K. F. (2000). Security analysis of public key certificate issuance protocols over Internet and wireless networks. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-5711 ; https://doi.org/10.14711/thesis-b697841 ; http://repository.ust.hk/ir/bitstream/1783.1-5711/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ip, Epsilon Kin Fai. “Security analysis of public key certificate issuance protocols over Internet and wireless networks.” 2000. Thesis, Hong Kong University of Science and Technology. Accessed January 23, 2020. http://repository.ust.hk/ir/Record/1783.1-5711 ; https://doi.org/10.14711/thesis-b697841 ; http://repository.ust.hk/ir/bitstream/1783.1-5711/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ip, Epsilon Kin Fai. “Security analysis of public key certificate issuance protocols over Internet and wireless networks.” 2000. Web. 23 Jan 2020.

Vancouver:

Ip EKF. Security analysis of public key certificate issuance protocols over Internet and wireless networks. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2000. [cited 2020 Jan 23]. Available from: http://repository.ust.hk/ir/Record/1783.1-5711 ; https://doi.org/10.14711/thesis-b697841 ; http://repository.ust.hk/ir/bitstream/1783.1-5711/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ip EKF. Security analysis of public key certificate issuance protocols over Internet and wireless networks. [Thesis]. Hong Kong University of Science and Technology; 2000. Available from: http://repository.ust.hk/ir/Record/1783.1-5711 ; https://doi.org/10.14711/thesis-b697841 ; http://repository.ust.hk/ir/bitstream/1783.1-5711/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Macquarie University

9. Lai, Hong. The design and analysis of quantum cryptographic protocols.

Degree: 2015, Macquarie University

Empirical thesis.

1. Introduction  – 2. Preliminaries  – 3. High-capacity quantum key distribution protocols  – 4. Quantum secret sharing protocols of secure direct communication  –… (more)

Subjects/Keywords: Data encryption (Computer science); Quantum communication  – Security measures; Coding theory; quantum key distribution; quantum secret sharing; Lucas numbers; Chebyshev maps; occurrence; fountain codes; extended unitary operations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lai, H. (2015). The design and analysis of quantum cryptographic protocols. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/1068045

Chicago Manual of Style (16th Edition):

Lai, Hong. “The design and analysis of quantum cryptographic protocols.” 2015. Doctoral Dissertation, Macquarie University. Accessed January 23, 2020. http://hdl.handle.net/1959.14/1068045.

MLA Handbook (7th Edition):

Lai, Hong. “The design and analysis of quantum cryptographic protocols.” 2015. Web. 23 Jan 2020.

Vancouver:

Lai H. The design and analysis of quantum cryptographic protocols. [Internet] [Doctoral dissertation]. Macquarie University; 2015. [cited 2020 Jan 23]. Available from: http://hdl.handle.net/1959.14/1068045.

Council of Science Editors:

Lai H. The design and analysis of quantum cryptographic protocols. [Doctoral Dissertation]. Macquarie University; 2015. Available from: http://hdl.handle.net/1959.14/1068045


Technical University of Lisbon

10. Miranda, Inês Brás de Moura Duarte. KPIs as a measure for quality in master data.

Degree: 2017, Technical University of Lisbon

Mestrado em Gestão de Sistemas de Informação

Numa época em que as empresas estão a dar mais e mais importância à implementação de sistemas de… (more)

Subjects/Keywords: Key Performance Indicators; Qualidade dos Dados; Master Data de Recursos Humanos; Master Data; Indicadores de Performance; Data Quality; Human Resources Master Data; Performance Measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miranda, I. B. d. M. D. (2017). KPIs as a measure for quality in master data. (Thesis). Technical University of Lisbon. Retrieved from https://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/14590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Miranda, Inês Brás de Moura Duarte. “KPIs as a measure for quality in master data.” 2017. Thesis, Technical University of Lisbon. Accessed January 23, 2020. https://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/14590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Miranda, Inês Brás de Moura Duarte. “KPIs as a measure for quality in master data.” 2017. Web. 23 Jan 2020.

Vancouver:

Miranda IBdMD. KPIs as a measure for quality in master data. [Internet] [Thesis]. Technical University of Lisbon; 2017. [cited 2020 Jan 23]. Available from: https://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/14590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Miranda IBdMD. KPIs as a measure for quality in master data. [Thesis]. Technical University of Lisbon; 2017. Available from: https://www.rcaap.pt/detail.jsp?id=oai:www.repository.utl.pt:10400.5/14590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Central Florida

11. Reinking, Jeffrey. The Diffusion Of Digital Dashboards: An Examination Of Dashboard Utilization And The Managerial Decision Environment.

Degree: 2013, University of Central Florida

 This dissertation consists of three related studies examining the diffusion of digital dashboard technology throughout today’s organizations. Dashboards, once reserved for the executive level, are… (more)

Subjects/Keywords: Digital dashboards; management control systems; interactive management control; strategy; key performance measures; strategy surrogation; Accounting; Business Administration  – Dissertations, Academic, Dissertations, Academic  – Business Administration

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reinking, J. (2013). The Diffusion Of Digital Dashboards: An Examination Of Dashboard Utilization And The Managerial Decision Environment. (Doctoral Dissertation). University of Central Florida. Retrieved from https://stars.library.ucf.edu/etd/2783

Chicago Manual of Style (16th Edition):

Reinking, Jeffrey. “The Diffusion Of Digital Dashboards: An Examination Of Dashboard Utilization And The Managerial Decision Environment.” 2013. Doctoral Dissertation, University of Central Florida. Accessed January 23, 2020. https://stars.library.ucf.edu/etd/2783.

MLA Handbook (7th Edition):

Reinking, Jeffrey. “The Diffusion Of Digital Dashboards: An Examination Of Dashboard Utilization And The Managerial Decision Environment.” 2013. Web. 23 Jan 2020.

Vancouver:

Reinking J. The Diffusion Of Digital Dashboards: An Examination Of Dashboard Utilization And The Managerial Decision Environment. [Internet] [Doctoral dissertation]. University of Central Florida; 2013. [cited 2020 Jan 23]. Available from: https://stars.library.ucf.edu/etd/2783.

Council of Science Editors:

Reinking J. The Diffusion Of Digital Dashboards: An Examination Of Dashboard Utilization And The Managerial Decision Environment. [Doctoral Dissertation]. University of Central Florida; 2013. Available from: https://stars.library.ucf.edu/etd/2783


Hong Kong University of Science and Technology

12. Cheung, Tin-Wo. A PKI-based secure infrastructure for mobile electronic commerce.

Degree: 2001, Hong Kong University of Science and Technology

 Electronic commerce is gaining popularity in recent years. The high penetration rate of the mobile handset, evolving technology on handheld mobile devices and deployment of… (more)

Subjects/Keywords: Public key cryptography ; Electronic commerce  – Security measures ; Mobile communication systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheung, T. (2001). A PKI-based secure infrastructure for mobile electronic commerce. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-5731 ; https://doi.org/10.14711/thesis-b712125 ; http://repository.ust.hk/ir/bitstream/1783.1-5731/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheung, Tin-Wo. “A PKI-based secure infrastructure for mobile electronic commerce.” 2001. Thesis, Hong Kong University of Science and Technology. Accessed January 23, 2020. http://repository.ust.hk/ir/Record/1783.1-5731 ; https://doi.org/10.14711/thesis-b712125 ; http://repository.ust.hk/ir/bitstream/1783.1-5731/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheung, Tin-Wo. “A PKI-based secure infrastructure for mobile electronic commerce.” 2001. Web. 23 Jan 2020.

Vancouver:

Cheung T. A PKI-based secure infrastructure for mobile electronic commerce. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2001. [cited 2020 Jan 23]. Available from: http://repository.ust.hk/ir/Record/1783.1-5731 ; https://doi.org/10.14711/thesis-b712125 ; http://repository.ust.hk/ir/bitstream/1783.1-5731/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheung T. A PKI-based secure infrastructure for mobile electronic commerce. [Thesis]. Hong Kong University of Science and Technology; 2001. Available from: http://repository.ust.hk/ir/Record/1783.1-5731 ; https://doi.org/10.14711/thesis-b712125 ; http://repository.ust.hk/ir/bitstream/1783.1-5731/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Minier, Nicolas. Implementing Performance Measurement to support Continuous Improvement : An empirical case study in construction industry.

Degree: The Institute of Technology, 2014, Linköping UniversityLinköping University

  Performance Measurement is necessary in order to support the implementation of a Continuous Improvement approach within a company. Performance Measurement has been a subject(more)

Subjects/Keywords: Performance Measurement; Continuous Improvement; Construction Industry; Performance Measurement Implementation; Key Performance Indicators; KPI; Leading measures; Performance Measurement System; Balanced Scorecard; Monitoring room; Dashboard; Organisational learning; Double-loop learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Minier, N. (2014). Implementing Performance Measurement to support Continuous Improvement : An empirical case study in construction industry. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-110860

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Minier, Nicolas. “Implementing Performance Measurement to support Continuous Improvement : An empirical case study in construction industry.” 2014. Thesis, Linköping UniversityLinköping University. Accessed January 23, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-110860.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Minier, Nicolas. “Implementing Performance Measurement to support Continuous Improvement : An empirical case study in construction industry.” 2014. Web. 23 Jan 2020.

Vancouver:

Minier N. Implementing Performance Measurement to support Continuous Improvement : An empirical case study in construction industry. [Internet] [Thesis]. Linköping UniversityLinköping University; 2014. [cited 2020 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-110860.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Minier N. Implementing Performance Measurement to support Continuous Improvement : An empirical case study in construction industry. [Thesis]. Linköping UniversityLinköping University; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-110860

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Uppsala University

14. Gustafsson, Martin Salin. Operational management through key performance Indicators : A case study performed at the warehouses at Fresenius Kabi.

Degree: Industrial Engineering & Management, 2018, Uppsala University

  Purpose: The purpose of this study is to identify and develop relevant keyperformance indicators within the warehouse operations in amanufacturing company, and how they… (more)

Subjects/Keywords: Key Performance Indicators (KPI); Critical Success Factors (CSF); Performance measures (PM); Management; Supply Chain Planning; Warehouse; Fresenius Kabi; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gustafsson, M. S. (2018). Operational management through key performance Indicators : A case study performed at the warehouses at Fresenius Kabi. (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-357294

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gustafsson, Martin Salin. “Operational management through key performance Indicators : A case study performed at the warehouses at Fresenius Kabi.” 2018. Thesis, Uppsala University. Accessed January 23, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-357294.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gustafsson, Martin Salin. “Operational management through key performance Indicators : A case study performed at the warehouses at Fresenius Kabi.” 2018. Web. 23 Jan 2020.

Vancouver:

Gustafsson MS. Operational management through key performance Indicators : A case study performed at the warehouses at Fresenius Kabi. [Internet] [Thesis]. Uppsala University; 2018. [cited 2020 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-357294.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gustafsson MS. Operational management through key performance Indicators : A case study performed at the warehouses at Fresenius Kabi. [Thesis]. Uppsala University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-357294

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

15. Gonzalez-Nieto, Juan Manuel. Key recovery systems.

Degree: 2002, Queensland University of Technology

Subjects/Keywords: Data encryption (Computer science); Computer networks Security measures; key recovery; key escrow; key management; self-escrowed cryptosystems; file system security; cryptography; thesis; doctoral

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gonzalez-Nieto, J. M. (2002). Key recovery systems. (Thesis). Queensland University of Technology. Retrieved from http://eprints.qut.edu.au/36877/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gonzalez-Nieto, Juan Manuel. “Key recovery systems.” 2002. Thesis, Queensland University of Technology. Accessed January 23, 2020. http://eprints.qut.edu.au/36877/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gonzalez-Nieto, Juan Manuel. “Key recovery systems.” 2002. Web. 23 Jan 2020.

Vancouver:

Gonzalez-Nieto JM. Key recovery systems. [Internet] [Thesis]. Queensland University of Technology; 2002. [cited 2020 Jan 23]. Available from: http://eprints.qut.edu.au/36877/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gonzalez-Nieto JM. Key recovery systems. [Thesis]. Queensland University of Technology; 2002. Available from: http://eprints.qut.edu.au/36877/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Zhu, Ying. Discovering Key Players and Key Groups in a Soccer Team Using Centrality Measures.

Degree: MS, Engineering, 2015, University of Wisconsin – Milwaukee

  In this thesis, I introduce that passing performance is crucial skill in the soccer game. I provide network centrality approaches to discover key players… (more)

Subjects/Keywords: Centrality Measures; Key Groups; Key Players; Network Analysis; Soccer Team; Electrical and Computer Engineering; Electrical and Electronics

…x7D; with his own the highest inter-centrality measures are both not in the first key group… …44 Table 2 : Key groups… …the most important player (key player) in a soccer team. A general naive answer… …is that the player with the most goals is the key player, but, in modern football, a more… …thoughtful answer is the player at the center of the passes may be the key player. Actually, a… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. (2015). Discovering Key Players and Key Groups in a Soccer Team Using Centrality Measures. (Thesis). University of Wisconsin – Milwaukee. Retrieved from https://dc.uwm.edu/etd/941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhu, Ying. “Discovering Key Players and Key Groups in a Soccer Team Using Centrality Measures.” 2015. Thesis, University of Wisconsin – Milwaukee. Accessed January 23, 2020. https://dc.uwm.edu/etd/941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhu, Ying. “Discovering Key Players and Key Groups in a Soccer Team Using Centrality Measures.” 2015. Web. 23 Jan 2020.

Vancouver:

Zhu Y. Discovering Key Players and Key Groups in a Soccer Team Using Centrality Measures. [Internet] [Thesis]. University of Wisconsin – Milwaukee; 2015. [cited 2020 Jan 23]. Available from: https://dc.uwm.edu/etd/941.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhu Y. Discovering Key Players and Key Groups in a Soccer Team Using Centrality Measures. [Thesis]. University of Wisconsin – Milwaukee; 2015. Available from: https://dc.uwm.edu/etd/941

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – San Bernardino

17. Macdonell, James Patrick. MiniCA: A web-based certificate authority.

Degree: MSin Computer Science, School of Computer Science and Engineering, 2007, California State University – San Bernardino

 The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures.… (more)

Subjects/Keywords: Computer networks Security measures; Computer networks Access control; Public key cryptography; Data encryption (Computer science); Data protection; Computer networks Access control; Computer networks Security measures; Data encryption (Computer science); Data protection; Public key cryptography.; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Macdonell, J. P. (2007). MiniCA: A web-based certificate authority. (Thesis). California State University – San Bernardino. Retrieved from https://scholarworks.lib.csusb.edu/etd-project/3256

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Macdonell, James Patrick. “MiniCA: A web-based certificate authority.” 2007. Thesis, California State University – San Bernardino. Accessed January 23, 2020. https://scholarworks.lib.csusb.edu/etd-project/3256.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Macdonell, James Patrick. “MiniCA: A web-based certificate authority.” 2007. Web. 23 Jan 2020.

Vancouver:

Macdonell JP. MiniCA: A web-based certificate authority. [Internet] [Thesis]. California State University – San Bernardino; 2007. [cited 2020 Jan 23]. Available from: https://scholarworks.lib.csusb.edu/etd-project/3256.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Macdonell JP. MiniCA: A web-based certificate authority. [Thesis]. California State University – San Bernardino; 2007. Available from: https://scholarworks.lib.csusb.edu/etd-project/3256

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Central Florida

18. Ferreras, Ana. A Comprehensive Multi-faceted Approach For Simultaneously Analyzing Organizational Performance Measures Essential For Company Su.

Degree: 2008, University of Central Florida

 Profit, ergonomics, safety, employee morale, quality, efficiency, and productivity are critical components that greatly impact company success within manufacturing organizations. Therefore, it is essential that… (more)

Subjects/Keywords: Company Success; Key Performance Measures; Manufacturing Enterprises; Employee Morale; Quality; Ergonomics and Safety; Engineering; Industrial Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ferreras, A. (2008). A Comprehensive Multi-faceted Approach For Simultaneously Analyzing Organizational Performance Measures Essential For Company Su. (Doctoral Dissertation). University of Central Florida. Retrieved from https://stars.library.ucf.edu/etd/3640

Chicago Manual of Style (16th Edition):

Ferreras, Ana. “A Comprehensive Multi-faceted Approach For Simultaneously Analyzing Organizational Performance Measures Essential For Company Su.” 2008. Doctoral Dissertation, University of Central Florida. Accessed January 23, 2020. https://stars.library.ucf.edu/etd/3640.

MLA Handbook (7th Edition):

Ferreras, Ana. “A Comprehensive Multi-faceted Approach For Simultaneously Analyzing Organizational Performance Measures Essential For Company Su.” 2008. Web. 23 Jan 2020.

Vancouver:

Ferreras A. A Comprehensive Multi-faceted Approach For Simultaneously Analyzing Organizational Performance Measures Essential For Company Su. [Internet] [Doctoral dissertation]. University of Central Florida; 2008. [cited 2020 Jan 23]. Available from: https://stars.library.ucf.edu/etd/3640.

Council of Science Editors:

Ferreras A. A Comprehensive Multi-faceted Approach For Simultaneously Analyzing Organizational Performance Measures Essential For Company Su. [Doctoral Dissertation]. University of Central Florida; 2008. Available from: https://stars.library.ucf.edu/etd/3640

19. Lesan, Kristijan. OPTIMIZACIJA DELOVANJA ENERGETSKEGA SISTEMA ZA UČINKOVITEJŠE RAVNANJE Z ENERGIJO V NESTANOVANJSKIH STAVBAH.

Degree: 2016, Univerza v Mariboru

Poraba energije, ki nastane zaradi uporabe energijsko neučinkovitih tehnologij, neustrezne nastavitve elementov energetskega sistema ter neučinkovitega obnašanja uporabnikov, predstavlja nepotreben strošek poslovanja podjetja oziroma obratovanja… (more)

Subjects/Keywords: energetska učinkovitost; optimizacija; sistematično upravljanje z energijo; ključni kazalniki rabe energije; vrednotenje neinvesticijskih ukrepov; energy efficiency; optimization; systematic energy management; key indicators of energy; evaluation of non-investment measures; info:eu-repo/classification/udc/697.1:336.532.2(043.2)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lesan, K. (2016). OPTIMIZACIJA DELOVANJA ENERGETSKEGA SISTEMA ZA UČINKOVITEJŠE RAVNANJE Z ENERGIJO V NESTANOVANJSKIH STAVBAH. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=57265 ; https://dk.um.si/Dokument.php?id=87596&dn= ; https://plus.si.cobiss.net/opac7/bib/1024225628?lang=sl

Chicago Manual of Style (16th Edition):

Lesan, Kristijan. “OPTIMIZACIJA DELOVANJA ENERGETSKEGA SISTEMA ZA UČINKOVITEJŠE RAVNANJE Z ENERGIJO V NESTANOVANJSKIH STAVBAH.” 2016. Masters Thesis, Univerza v Mariboru. Accessed January 23, 2020. https://dk.um.si/IzpisGradiva.php?id=57265 ; https://dk.um.si/Dokument.php?id=87596&dn= ; https://plus.si.cobiss.net/opac7/bib/1024225628?lang=sl.

MLA Handbook (7th Edition):

Lesan, Kristijan. “OPTIMIZACIJA DELOVANJA ENERGETSKEGA SISTEMA ZA UČINKOVITEJŠE RAVNANJE Z ENERGIJO V NESTANOVANJSKIH STAVBAH.” 2016. Web. 23 Jan 2020.

Vancouver:

Lesan K. OPTIMIZACIJA DELOVANJA ENERGETSKEGA SISTEMA ZA UČINKOVITEJŠE RAVNANJE Z ENERGIJO V NESTANOVANJSKIH STAVBAH. [Internet] [Masters thesis]. Univerza v Mariboru; 2016. [cited 2020 Jan 23]. Available from: https://dk.um.si/IzpisGradiva.php?id=57265 ; https://dk.um.si/Dokument.php?id=87596&dn= ; https://plus.si.cobiss.net/opac7/bib/1024225628?lang=sl.

Council of Science Editors:

Lesan K. OPTIMIZACIJA DELOVANJA ENERGETSKEGA SISTEMA ZA UČINKOVITEJŠE RAVNANJE Z ENERGIJO V NESTANOVANJSKIH STAVBAH. [Masters Thesis]. Univerza v Mariboru; 2016. Available from: https://dk.um.si/IzpisGradiva.php?id=57265 ; https://dk.um.si/Dokument.php?id=87596&dn= ; https://plus.si.cobiss.net/opac7/bib/1024225628?lang=sl


Hong Kong University of Science and Technology

20. Wong, Ka-Cheong. Enforcement of digital rights management using offline watermark detection and public key infrastructure.

Degree: 2001, Hong Kong University of Science and Technology

 Copyrights of digital content can be protected through the use of watermarks. Watermark detection, however, faces one major technical challenge. Existing detection mechanisms require the… (more)

Subjects/Keywords: Digital watermarking ; Data encryption (Computer science) ; Copyright and electronic data processing ; Public key cryptography ; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong, K. (2001). Enforcement of digital rights management using offline watermark detection and public key infrastructure. (Thesis). Hong Kong University of Science and Technology. Retrieved from http://repository.ust.hk/ir/Record/1783.1-5712 ; https://doi.org/10.14711/thesis-b697845 ; http://repository.ust.hk/ir/bitstream/1783.1-5712/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wong, Ka-Cheong. “Enforcement of digital rights management using offline watermark detection and public key infrastructure.” 2001. Thesis, Hong Kong University of Science and Technology. Accessed January 23, 2020. http://repository.ust.hk/ir/Record/1783.1-5712 ; https://doi.org/10.14711/thesis-b697845 ; http://repository.ust.hk/ir/bitstream/1783.1-5712/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wong, Ka-Cheong. “Enforcement of digital rights management using offline watermark detection and public key infrastructure.” 2001. Web. 23 Jan 2020.

Vancouver:

Wong K. Enforcement of digital rights management using offline watermark detection and public key infrastructure. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2001. [cited 2020 Jan 23]. Available from: http://repository.ust.hk/ir/Record/1783.1-5712 ; https://doi.org/10.14711/thesis-b697845 ; http://repository.ust.hk/ir/bitstream/1783.1-5712/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wong K. Enforcement of digital rights management using offline watermark detection and public key infrastructure. [Thesis]. Hong Kong University of Science and Technology; 2001. Available from: http://repository.ust.hk/ir/Record/1783.1-5712 ; https://doi.org/10.14711/thesis-b697845 ; http://repository.ust.hk/ir/bitstream/1783.1-5712/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Florida

21. Anand, Baldeep. Power aware public key authentication for Bluetooth.

Degree: 2003, University of Florida

Subjects/Keywords: Authentication; Computer technology; Cryptography; Data encryption; Digital signatures; Key signatures; Network security; Public key cryptography; Time signatures; Wireless technology; AUTHENTICATION, BLUETOOTH, SECURITY, WIRELESS; Bluetooth technology; Computer and Information Science and Engineering thesis,M.S; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anand, B. (2003). Power aware public key authentication for Bluetooth. (Thesis). University of Florida. Retrieved from http://ufdc.ufl.edu/UFE0000630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Anand, Baldeep. “Power aware public key authentication for Bluetooth.” 2003. Thesis, University of Florida. Accessed January 23, 2020. http://ufdc.ufl.edu/UFE0000630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Anand, Baldeep. “Power aware public key authentication for Bluetooth.” 2003. Web. 23 Jan 2020.

Vancouver:

Anand B. Power aware public key authentication for Bluetooth. [Internet] [Thesis]. University of Florida; 2003. [cited 2020 Jan 23]. Available from: http://ufdc.ufl.edu/UFE0000630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Anand B. Power aware public key authentication for Bluetooth. [Thesis]. University of Florida; 2003. Available from: http://ufdc.ufl.edu/UFE0000630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Florida

22. Park, Hyun, 1960-. Enforcing access control policies in internetwork environments.

Degree: PhD, Computer and Information Science and Engineering, 1996, University of Florida

Subjects/Keywords: Access control systems; Authentication; Cryptography; Data encryption; Data security; Identifiers; Internet; Key signatures; Local area networks; Network security; Computer networks  – Security measures; Computer networks  – Security measures  – Mathematical models; Computers  – Access control; Internetworking (Telecommunication)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Park, Hyun, 1. (1996). Enforcing access control policies in internetwork environments. (Doctoral Dissertation). University of Florida. Retrieved from http://ufdc.ufl.edu/AA00031462

Chicago Manual of Style (16th Edition):

Park, Hyun, 1960-. “Enforcing access control policies in internetwork environments.” 1996. Doctoral Dissertation, University of Florida. Accessed January 23, 2020. http://ufdc.ufl.edu/AA00031462.

MLA Handbook (7th Edition):

Park, Hyun, 1960-. “Enforcing access control policies in internetwork environments.” 1996. Web. 23 Jan 2020.

Vancouver:

Park, Hyun 1. Enforcing access control policies in internetwork environments. [Internet] [Doctoral dissertation]. University of Florida; 1996. [cited 2020 Jan 23]. Available from: http://ufdc.ufl.edu/AA00031462.

Council of Science Editors:

Park, Hyun 1. Enforcing access control policies in internetwork environments. [Doctoral Dissertation]. University of Florida; 1996. Available from: http://ufdc.ufl.edu/AA00031462


IUPUI

23. Rangwala, Mohammed M. Secure Digital Provenance: Challenges and a New Design.

Degree: 2014, IUPUI

Indiana University-Purdue University Indianapolis (IUPUI)

Derived from the field of art curation, digital provenance is an unforgeable record of a digital object's chain of successive… (more)

Subjects/Keywords: availability; confidentiality; cryptography; integrity; provenance; signatures; Computer security  – Management  – Research  – Methodology; Public key infrastructure (Computer security); Data encryption (Computer science)  – Evaluation; Cryptography  – Research; Data protection  – Research; Digital signatures; Cultural property  – Protection; Confidential communications  – Access control; Computer networks  – Design and construction; Computer networks  – Security measures; Database management; Databases  – Quality control; Information services  – Security measures; Computer networks  – Monitoring; Information services  – Quality control; Application software  – Development; Computational intelligence  – Reliability; Computer programs  – Validation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rangwala, M. M. (2014). Secure Digital Provenance: Challenges and a New Design. (Thesis). IUPUI. Retrieved from http://hdl.handle.net/1805/6051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rangwala, Mohammed M. “Secure Digital Provenance: Challenges and a New Design.” 2014. Thesis, IUPUI. Accessed January 23, 2020. http://hdl.handle.net/1805/6051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rangwala, Mohammed M. “Secure Digital Provenance: Challenges and a New Design.” 2014. Web. 23 Jan 2020.

Vancouver:

Rangwala MM. Secure Digital Provenance: Challenges and a New Design. [Internet] [Thesis]. IUPUI; 2014. [cited 2020 Jan 23]. Available from: http://hdl.handle.net/1805/6051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rangwala MM. Secure Digital Provenance: Challenges and a New Design. [Thesis]. IUPUI; 2014. Available from: http://hdl.handle.net/1805/6051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Bloch, Matthieu. Physical-layer security.

Degree: PhD, Electrical and Computer Engineering, 2008, Georgia Tech

 As wireless networks continue to flourish worldwide and play an increasingly prominent role, it has become crucial to provide effective solutions to the inherent security… (more)

Subjects/Keywords: Wiretap channel; Information-theoretic security; Physical-layer security; Secret-key agreement; LDPC codes; Wireless communication systems; Computer networks Security measures

…channel model . . . . . . . . . . . . . . . 15 Secret key agreement from common randomness… …17 2.4.1 Three-terminal secret key agreement . . . . . . . . . . . . . . . . . 17 2.4.2… …Extensions of secret key agreement results . . . . . . . . . . . . . . 19 2.4.3 Beyond classical… …secret key agreement: quantum cryptography . . . 20 Practical information-theoretic tools… …commitment . . . . . . . . . . . . . . . . . . . . . 6.2 Bit commitment from secret key agreement… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bloch, M. (2008). Physical-layer security. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/24658

Chicago Manual of Style (16th Edition):

Bloch, Matthieu. “Physical-layer security.” 2008. Doctoral Dissertation, Georgia Tech. Accessed January 23, 2020. http://hdl.handle.net/1853/24658.

MLA Handbook (7th Edition):

Bloch, Matthieu. “Physical-layer security.” 2008. Web. 23 Jan 2020.

Vancouver:

Bloch M. Physical-layer security. [Internet] [Doctoral dissertation]. Georgia Tech; 2008. [cited 2020 Jan 23]. Available from: http://hdl.handle.net/1853/24658.

Council of Science Editors:

Bloch M. Physical-layer security. [Doctoral Dissertation]. Georgia Tech; 2008. Available from: http://hdl.handle.net/1853/24658


Linköping University

25. Mannerheim, Kristoffer. Fokus på : utveckling av nyckeltal för effektiv internlogistik.

Degree: Management and Engineering, 2008, Linköping University

Detta arbete inom prestationsmätning av effektiv logistik är utfört på Scanias produktionsenhet MB i Oskarshamn. Denna produktionsenhet tillverkar hytterna till Scanias lastbilar på europamarknaden,… (more)

Subjects/Keywords: KPI; Logistics; Performance measurement; Key Performace Indicators; Measures; Material handling; Nyckeltal; Produktionslogistik; Prestationsmätning; Logistik; Mätetal; Materialhantering; Industrial engineering and economy; Industriell teknik och ekonomi

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mannerheim, K. (2008). Fokus på : utveckling av nyckeltal för effektiv internlogistik. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10555

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mannerheim, Kristoffer. “Fokus på : utveckling av nyckeltal för effektiv internlogistik.” 2008. Thesis, Linköping University. Accessed January 23, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10555.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mannerheim, Kristoffer. “Fokus på : utveckling av nyckeltal för effektiv internlogistik.” 2008. Web. 23 Jan 2020.

Vancouver:

Mannerheim K. Fokus på : utveckling av nyckeltal för effektiv internlogistik. [Internet] [Thesis]. Linköping University; 2008. [cited 2020 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10555.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mannerheim K. Fokus på : utveckling av nyckeltal för effektiv internlogistik. [Thesis]. Linköping University; 2008. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10555

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Florida

26. Aringunram, Ravichandran. Secure communication services for distributed conference system.

Degree: M.S, Computer and Information Science and Engineering, 2002, University of Florida

The above mentioned functionalities have been implemented and is presented as a separate module to DCS v.2. Thus SCS provides the important security features needed for distributed collaborative work.

Subjects/Keywords: Authentication; Bytes; Ciphertexts; Cryptography; Data encryption; Databases; Decryption; Digital signatures; Key signatures; Transmitters; Computer conferencing; Computer networks  – Access control; Computer networks  – Security measures; Teams in the workplace  – Data processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aringunram, R. (2002). Secure communication services for distributed conference system. (Masters Thesis). University of Florida. Retrieved from http://ufdc.ufl.edu/UFE0000505

Chicago Manual of Style (16th Edition):

Aringunram, Ravichandran. “Secure communication services for distributed conference system.” 2002. Masters Thesis, University of Florida. Accessed January 23, 2020. http://ufdc.ufl.edu/UFE0000505.

MLA Handbook (7th Edition):

Aringunram, Ravichandran. “Secure communication services for distributed conference system.” 2002. Web. 23 Jan 2020.

Vancouver:

Aringunram R. Secure communication services for distributed conference system. [Internet] [Masters thesis]. University of Florida; 2002. [cited 2020 Jan 23]. Available from: http://ufdc.ufl.edu/UFE0000505.

Council of Science Editors:

Aringunram R. Secure communication services for distributed conference system. [Masters Thesis]. University of Florida; 2002. Available from: http://ufdc.ufl.edu/UFE0000505

27. Pham, Hai. Distinguishability of Public Keys and Experimental Validation: The McEliece Public-Keyed Cryptosystem.

Degree: MS, 2015, Florida Atlantic University

Summary: As quantum computers continue to develop, they pose a threat to cryptography since many popular cryptosystems will be rendered vulnerable. This is because the… (more)

Subjects/Keywords: Coding theory; Combinatorial analysis; Data encryption (Computer science); Data transmission systems  – Security measures; Information theory; McEliece, Robert J.  – Influence; Public key cryptography

…DISTINGUISHABILITY OF PUBLIC KEYS AND EXPERIMENTAL VALIDATION: THE MCELIECE PUBLIC-KEY… …known algorithms. Private-key cryptography will be weakened, but it seems that with an… …increase in key size, one may restore the necessary security. For example, AES-128 uses a key of… …128 bits, and so around 2127 operations are the expected requirement to recover the key… …recover an AES-128 key [1]. The solution in mind here is to switch to AES-256. The… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pham, H. (2015). Distinguishability of Public Keys and Experimental Validation: The McEliece Public-Keyed Cryptosystem. (Masters Thesis). Florida Atlantic University. Retrieved from http://purl.flvc.org/fau/fd/FA00004535 ; (URL) http://purl.flvc.org/fau/fd/FA00004535

Chicago Manual of Style (16th Edition):

Pham, Hai. “Distinguishability of Public Keys and Experimental Validation: The McEliece Public-Keyed Cryptosystem.” 2015. Masters Thesis, Florida Atlantic University. Accessed January 23, 2020. http://purl.flvc.org/fau/fd/FA00004535 ; (URL) http://purl.flvc.org/fau/fd/FA00004535.

MLA Handbook (7th Edition):

Pham, Hai. “Distinguishability of Public Keys and Experimental Validation: The McEliece Public-Keyed Cryptosystem.” 2015. Web. 23 Jan 2020.

Vancouver:

Pham H. Distinguishability of Public Keys and Experimental Validation: The McEliece Public-Keyed Cryptosystem. [Internet] [Masters thesis]. Florida Atlantic University; 2015. [cited 2020 Jan 23]. Available from: http://purl.flvc.org/fau/fd/FA00004535 ; (URL) http://purl.flvc.org/fau/fd/FA00004535.

Council of Science Editors:

Pham H. Distinguishability of Public Keys and Experimental Validation: The McEliece Public-Keyed Cryptosystem. [Masters Thesis]. Florida Atlantic University; 2015. Available from: http://purl.flvc.org/fau/fd/FA00004535 ; (URL) http://purl.flvc.org/fau/fd/FA00004535

28. Ling, Jie. Smart card fault attacks on public key and elliptic curve cryptography.

Degree: 2014, IUPUI

Indiana University-Purdue University Indianapolis (IUPUI)

Blömmer, Otto, and Seifert presented a fault attack on elliptic curve scalar multiplication called the Sign Change Attack, which causes… (more)

Subjects/Keywords: Smart Card; RSA; ECC; Fault Attack; Smart Card Security; Public Key; NAF; wNAF; Counter Fault Attack; Bit Flip Attack; Doubling Attack; Attack Simulation; Smart cards  – Security measures  – Research  – Analysis; Data encryption (Computer science); Curves, Elliptic  – Data processing; Cryptography  – Mathematics; Public key cryptography  – Research; Public key infrastructure (Computer security); Data protection  – Research; Computer engineering  – Research; Coding theory; Computer security; Data structures (Computer science); Embedded computer systems; Smart card industry; Computer networks  – Security measures; Computers  – Access control

…on Public Key and Elliptic Curve Cryptography. Major Professor: Brian King. Bl¨ ommer, Otto… …selective manipulation of the key stream. In this thesis we describe two plausible fault attacks… …wNAF key. 1 1. INTRODUCTION Sandy, an account processor receives a phone call from a women… …engineer Serge Humpinch, announced his attack on public key system of French Cartes Bancaire. He… …techniques can efficiently break public key cryptosystems. Thus a new industry was created to… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ling, J. (2014). Smart card fault attacks on public key and elliptic curve cryptography. (Thesis). IUPUI. Retrieved from http://hdl.handle.net/1805/5967

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ling, Jie. “Smart card fault attacks on public key and elliptic curve cryptography.” 2014. Thesis, IUPUI. Accessed January 23, 2020. http://hdl.handle.net/1805/5967.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ling, Jie. “Smart card fault attacks on public key and elliptic curve cryptography.” 2014. Web. 23 Jan 2020.

Vancouver:

Ling J. Smart card fault attacks on public key and elliptic curve cryptography. [Internet] [Thesis]. IUPUI; 2014. [cited 2020 Jan 23]. Available from: http://hdl.handle.net/1805/5967.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ling J. Smart card fault attacks on public key and elliptic curve cryptography. [Thesis]. IUPUI; 2014. Available from: http://hdl.handle.net/1805/5967

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – San Bernardino

29. Stocking, Galen Asher Thomas. The threat of cyberterrorism: Contemporary consequences and prescriptions.

Degree: MAin National Security Studies, National Security Studies, 2004, California State University – San Bernardino

 This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat,… (more)

Subjects/Keywords: Cyberterrorism  – Prevention  – Government policy  – United States; National security  – Technological innovations  – United States; Terrorism  – Prevention  – Government policy  – United States; Public key infrastructure (Computer security)  – United States; Computer security  – Government policy  – United States; Computer networks  – Security measures  – United States; Defense and Security Studies; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stocking, G. A. T. (2004). The threat of cyberterrorism: Contemporary consequences and prescriptions. (Thesis). California State University – San Bernardino. Retrieved from http://scholarworks.lib.csusb.edu/etd-project/2590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Stocking, Galen Asher Thomas. “The threat of cyberterrorism: Contemporary consequences and prescriptions.” 2004. Thesis, California State University – San Bernardino. Accessed January 23, 2020. http://scholarworks.lib.csusb.edu/etd-project/2590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Stocking, Galen Asher Thomas. “The threat of cyberterrorism: Contemporary consequences and prescriptions.” 2004. Web. 23 Jan 2020.

Vancouver:

Stocking GAT. The threat of cyberterrorism: Contemporary consequences and prescriptions. [Internet] [Thesis]. California State University – San Bernardino; 2004. [cited 2020 Jan 23]. Available from: http://scholarworks.lib.csusb.edu/etd-project/2590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Stocking GAT. The threat of cyberterrorism: Contemporary consequences and prescriptions. [Thesis]. California State University – San Bernardino; 2004. Available from: http://scholarworks.lib.csusb.edu/etd-project/2590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Karlstad University

30. Nyh, Johan. From Snow White to Frozen : An evaluation of popular gender representation indicators applied to Disney’s princess films.

Degree: Media and Communication, 2015, Karlstad University

Simple content analysis methods, such as the Bechdel test and measuring percentage of female talk time or characters, have seen a surge of attention… (more)

Subjects/Keywords: Disney; princesses; Disney princesses; gender; Bechdel; Bechdel test; Walt Disney; Pixar; Frozen; children; girl; culture; gender representations; talk time; talktime; gendertimer; equality; content analysis; female; feminism; feminist; gender role; socialization model; gender role socialization model; passive; domestic; active; media; post-feminist; gender role portrayals; key measures; popular; nature or nurture; genes or environment; gender differences; expressions of gender; gender experiments; neurological; brain; plasticity; constructivist; cultivation theory; social cognitive theory; quantitative; quantitative measures; quantitative methods; stereotypes; stereotype; stereotypical; women; character count; biological sex; biological gender; metrics; femininity; textual analysis; submissive; submissive behaviour; independence; daddy's girl; patriarchy; patriarchal; patriarchal approval; wicked women; old wicked women; wicked witch; male; masculine; masculine characteristics; feminine characteristics; genders; marrying; marriage; love at first sight; empowerment; fairy tale; fairy tales; film; movie; films; movies; Mulan; Pocahontas; Snow White; Snow White and the seven dwarfs; Cinderella; Sleeping Beauty; Little Mermaid; The Little Mermaid; Beauty and the Beast; Aladdin; Tangled; Brave; Frozen; The Princess and the Frog; Merida; relationship; relationship formation; true love; true love's kiss; sisterhood; sisterly; Grimm; Grimm brothers; parental approval; matriarchal approval; matriarchal; matriarchy; stereotyping; evil queen; rate; rater; rating; measure; measuring; wicked stepmother; binary gender; gender binarity; binary genders; gender identities; gender identity; gender identity formation; identity formation; animation; cell animation; the Smurfette principle; strong women; strong girls; girlie; positivism; positivistic; film studies; analysis; analyses; antagonism; action; coding; cultivation effect; cultivation effects; socialization effect; socialization effects; coded content analysis; simple metrics; cognition theory; connotations; cultivation theory; socialization theory; depictions of femininity; plasticity; human brain; damsels in distress; feminist research; inequality; gender inequality; media studies; heroines; mass media; social media; images of women; woman as image; reading; interpretation; modern day fairy tales; Disney; prinsessor; Disneyprinsessor; Disney-prinsessor; kön; genus; genusvetenskap; Bechdel; Bechdel test; Bechdeltest; Bechdeltestet; Walt Disney; Pixar; Frost; barn; flickor; kulturuppväxt; representationer; skildringar; intryck; taltid; talk time; talktime; gendertimer; jämlikhet; innehållsanalys; feminin; feminism; könsroll; könsroller; socialisering; socialiseringsmodellen; passiv; hushållsarbete; aktiv; media; post-feministisk; postfemininstisk; nyckeltal; populärvetenskaplig; populärvetenskapligt; naturen; uppväxt eller gener; gener eller upppväxt; uppfostran; genetik; könsskillnader; könsuttryck; experiment; hjärnan; plasticitet; konstruktivism; kultivationsteori; kognitiv teori; kvantitativ; kvantitativa mått; kvantitativa metoder; stereotyper; stereotyp; stereotypisk; kvinnnor; kvinna; kön; biologiskt kön; mått; nyckeltal; femininitet; textanalys; filmanalys; kuvad; underkastad; submissiv; oberoende; pappas flicka; patriarkat; patriarkisk; patriarkalt godkännande; manlig; maskulin; kön; genus; äktenskap; kärlek vid första ögonkastet; saga; sagor; bröderna Grimm; film; Mulan; Pocahontas; Snövit och de sju dvärgarna; Askungen; Törnrosa; Den lilla Sjöjungfrun; Skönheten och Odjuret; Aladdin; Trassel; Modig; Frost; Prinsessan och Grodan; Merida; förhållanden; sann kärlek; Grimm; matriark; matriarkisk; patriarkalt godkännande; matriarkalt godkännande; bedöma; betygsätta; mått; mäta; ond styvmor; binära kön; könsidentitet; könsidentiteter; animation; Smurfan; starka kvinnor; starka flickor; positivistisk; positivism; filmvetenskap; filmstudier; antagonism; protagonist; hjältinna; kodning; kultivationseffekten; socialiseringseffekten; socialisationseffekten; kodad innehållsanalys; förenklade mått; kognitiv teori; konnotationer; konnotera; feministisk forskning; könsbalans; mediastudier; mediestudier; massmedia; social media; bilder av kvinnor; kvinnan som bild; images of women; woman as image; reading; interpretation; modern day fairy tales; tolkning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nyh, J. (2015). From Snow White to Frozen : An evaluation of popular gender representation indicators applied to Disney’s princess films. (Thesis). Karlstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36877

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nyh, Johan. “From Snow White to Frozen : An evaluation of popular gender representation indicators applied to Disney’s princess films.” 2015. Thesis, Karlstad University. Accessed January 23, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36877.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nyh, Johan. “From Snow White to Frozen : An evaluation of popular gender representation indicators applied to Disney’s princess films.” 2015. Web. 23 Jan 2020.

Vancouver:

Nyh J. From Snow White to Frozen : An evaluation of popular gender representation indicators applied to Disney’s princess films. [Internet] [Thesis]. Karlstad University; 2015. [cited 2020 Jan 23]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36877.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nyh J. From Snow White to Frozen : An evaluation of popular gender representation indicators applied to Disney’s princess films. [Thesis]. Karlstad University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36877

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.