Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(secure communication). Showing records 1 – 30 of 58 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


University of Limerick

1. Muntean, Carla Lucia Mirona. Logic based analysis of security protocols in a unified verification framework.

Degree: 2012, University of Limerick

peer-reviewed

Security protocols are one of the imperative steps in creating and ensuring the secure communication and information processing. Also known as cryptographic protocols or… (more)

Subjects/Keywords: secure communication; information processing; crytographic protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muntean, C. L. M. (2012). Logic based analysis of security protocols in a unified verification framework. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/2859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Muntean, Carla Lucia Mirona. “Logic based analysis of security protocols in a unified verification framework.” 2012. Thesis, University of Limerick. Accessed June 19, 2019. http://hdl.handle.net/10344/2859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Muntean, Carla Lucia Mirona. “Logic based analysis of security protocols in a unified verification framework.” 2012. Web. 19 Jun 2019.

Vancouver:

Muntean CLM. Logic based analysis of security protocols in a unified verification framework. [Internet] [Thesis]. University of Limerick; 2012. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/10344/2859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Muntean CLM. Logic based analysis of security protocols in a unified verification framework. [Thesis]. University of Limerick; 2012. Available from: http://hdl.handle.net/10344/2859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

2. Albalawi, Umar Abdalah S. New Frameworks for Secure Image Communication in the Internet of Things (IoT).

Degree: 2016, University of North Texas

 The continuous expansion of technology, broadband connectivity and the wide range of new devices in the IoT cause serious concerns regarding privacy and security. In… (more)

Subjects/Keywords: Secure Image Communication; Image Compression; IoT

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Albalawi, U. A. S. (2016). New Frameworks for Secure Image Communication in the Internet of Things (IoT). (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc862721/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Albalawi, Umar Abdalah S. “New Frameworks for Secure Image Communication in the Internet of Things (IoT).” 2016. Thesis, University of North Texas. Accessed June 19, 2019. https://digital.library.unt.edu/ark:/67531/metadc862721/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Albalawi, Umar Abdalah S. “New Frameworks for Secure Image Communication in the Internet of Things (IoT).” 2016. Web. 19 Jun 2019.

Vancouver:

Albalawi UAS. New Frameworks for Secure Image Communication in the Internet of Things (IoT). [Internet] [Thesis]. University of North Texas; 2016. [cited 2019 Jun 19]. Available from: https://digital.library.unt.edu/ark:/67531/metadc862721/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Albalawi UAS. New Frameworks for Secure Image Communication in the Internet of Things (IoT). [Thesis]. University of North Texas; 2016. Available from: https://digital.library.unt.edu/ark:/67531/metadc862721/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

3. John prakash A. Adaptive secure key establishment for multicast communications in dynamic networks;.

Degree: Secure key establishment for multicast communications in dynamic networks, 2014, Anna University

Multicast is an efficient way to deliver a message to a group of receivers and has become the basis of many applications Securing multicast communication(more)

Subjects/Keywords: Information and communication engineering; Multicast Communication; Networks; Secure key

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

A, J. p. (2014). Adaptive secure key establishment for multicast communications in dynamic networks;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/23020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

A, John prakash. “Adaptive secure key establishment for multicast communications in dynamic networks;.” 2014. Thesis, Anna University. Accessed June 19, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/23020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

A, John prakash. “Adaptive secure key establishment for multicast communications in dynamic networks;.” 2014. Web. 19 Jun 2019.

Vancouver:

A Jp. Adaptive secure key establishment for multicast communications in dynamic networks;. [Internet] [Thesis]. Anna University; 2014. [cited 2019 Jun 19]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/23020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

A Jp. Adaptive secure key establishment for multicast communications in dynamic networks;. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/23020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Indian Institute of Science

4. Vatedka, Shashank. Lattice Codes for Secure Communication and Secret Key Generation.

Degree: 2017, Indian Institute of Science

 In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via… (more)

Subjects/Keywords: Secret Key Generation; Secure Communication; Nested Lattice Codes; Information Theoretic Security; Secure Bidirectional Relaying; LDA Lattices; Secure Computation; Bidirectional Relay; Lattice Coding Scheme; Gaussian Markov Tree Sources; Electrical Communication Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vatedka, S. (2017). Lattice Codes for Secure Communication and Secret Key Generation. (Thesis). Indian Institute of Science. Retrieved from http://etd.iisc.ernet.in/2005/3584 ; http://etd.iisc.ernet.in/abstracts/4452/G28181-Abs.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vatedka, Shashank. “Lattice Codes for Secure Communication and Secret Key Generation.” 2017. Thesis, Indian Institute of Science. Accessed June 19, 2019. http://etd.iisc.ernet.in/2005/3584 ; http://etd.iisc.ernet.in/abstracts/4452/G28181-Abs.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vatedka, Shashank. “Lattice Codes for Secure Communication and Secret Key Generation.” 2017. Web. 19 Jun 2019.

Vancouver:

Vatedka S. Lattice Codes for Secure Communication and Secret Key Generation. [Internet] [Thesis]. Indian Institute of Science; 2017. [cited 2019 Jun 19]. Available from: http://etd.iisc.ernet.in/2005/3584 ; http://etd.iisc.ernet.in/abstracts/4452/G28181-Abs.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vatedka S. Lattice Codes for Secure Communication and Secret Key Generation. [Thesis]. Indian Institute of Science; 2017. Available from: http://etd.iisc.ernet.in/2005/3584 ; http://etd.iisc.ernet.in/abstracts/4452/G28181-Abs.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Christiansen, Mark M. Guesswork.

Degree: 2015, RIAN

 The security of systems is often predicated on a user or application selecting an object, a password or key, from a large list. If an… (more)

Subjects/Keywords: Guesswork; security of systems; modern applications; secure storage; communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Christiansen, M. M. (2015). Guesswork. (Thesis). RIAN. Retrieved from http://eprints.maynoothuniversity.ie/6520/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Christiansen, Mark M. “Guesswork.” 2015. Thesis, RIAN. Accessed June 19, 2019. http://eprints.maynoothuniversity.ie/6520/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Christiansen, Mark M. “Guesswork.” 2015. Web. 19 Jun 2019.

Vancouver:

Christiansen MM. Guesswork. [Internet] [Thesis]. RIAN; 2015. [cited 2019 Jun 19]. Available from: http://eprints.maynoothuniversity.ie/6520/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Christiansen MM. Guesswork. [Thesis]. RIAN; 2015. Available from: http://eprints.maynoothuniversity.ie/6520/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

6. Ganesan, Prasanth. Efficiently Adding Secure Communications to Networked Low-End Embedded Systems using Software Thread Integration.

Degree: MS, Computer Engineering, 2003, North Carolina State University

 The wide spread acceptance of distributed embedded networks is motivated by factors such as cost, weight and power consumption. Communication protocols or MAC layer protocols… (more)

Subjects/Keywords: software thread integration; secure communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ganesan, P. (2003). Efficiently Adding Secure Communications to Networked Low-End Embedded Systems using Software Thread Integration. (Thesis). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/2096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ganesan, Prasanth. “Efficiently Adding Secure Communications to Networked Low-End Embedded Systems using Software Thread Integration.” 2003. Thesis, North Carolina State University. Accessed June 19, 2019. http://www.lib.ncsu.edu/resolver/1840.16/2096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ganesan, Prasanth. “Efficiently Adding Secure Communications to Networked Low-End Embedded Systems using Software Thread Integration.” 2003. Web. 19 Jun 2019.

Vancouver:

Ganesan P. Efficiently Adding Secure Communications to Networked Low-End Embedded Systems using Software Thread Integration. [Internet] [Thesis]. North Carolina State University; 2003. [cited 2019 Jun 19]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/2096.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ganesan P. Efficiently Adding Secure Communications to Networked Low-End Embedded Systems using Software Thread Integration. [Thesis]. North Carolina State University; 2003. Available from: http://www.lib.ncsu.edu/resolver/1840.16/2096

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mid Sweden University

7. Min, Menglei. Evaluation and Implementation for Pushing Automatic Updates to IoT Devices.

Degree: Information Systems and Technology, 2017, Mid Sweden University

  In recent years, Internet of Things has developed rapidly, and now has penetrated into human life and industrial production. It is speculated that the… (more)

Subjects/Keywords: Automatic update; Internet of things; Digital signature; Secure sockets layer communication; Secure hash algorithm; Software Engineering; Programvaruteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Min, M. (2017). Evaluation and Implementation for Pushing Automatic Updates to IoT Devices. (Thesis). Mid Sweden University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31483

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Min, Menglei. “Evaluation and Implementation for Pushing Automatic Updates to IoT Devices.” 2017. Thesis, Mid Sweden University. Accessed June 19, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31483.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Min, Menglei. “Evaluation and Implementation for Pushing Automatic Updates to IoT Devices.” 2017. Web. 19 Jun 2019.

Vancouver:

Min M. Evaluation and Implementation for Pushing Automatic Updates to IoT Devices. [Internet] [Thesis]. Mid Sweden University; 2017. [cited 2019 Jun 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31483.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Min M. Evaluation and Implementation for Pushing Automatic Updates to IoT Devices. [Thesis]. Mid Sweden University; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31483

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

8. Zhang, Hongtao. Chaos synchronization and its application to secure communication.

Degree: 2010, University of Waterloo

 Chaos theory is well known as one of three revolutions in physical sciences in 20th-century, as one physicist called it: Relativity eliminated the Newtonian illusion… (more)

Subjects/Keywords: chaos; hyperchaos; chaotic attractor; chaos synchronization; network synchronization; secure communication; chaos communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. (2010). Chaos synchronization and its application to secure communication. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/5656

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Hongtao. “Chaos synchronization and its application to secure communication.” 2010. Thesis, University of Waterloo. Accessed June 19, 2019. http://hdl.handle.net/10012/5656.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Hongtao. “Chaos synchronization and its application to secure communication.” 2010. Web. 19 Jun 2019.

Vancouver:

Zhang H. Chaos synchronization and its application to secure communication. [Internet] [Thesis]. University of Waterloo; 2010. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/10012/5656.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang H. Chaos synchronization and its application to secure communication. [Thesis]. University of Waterloo; 2010. Available from: http://hdl.handle.net/10012/5656

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Haan, Robbert de. Algebraic techniques for low communication secure protocols.

Degree: 2009, Center for Mathematics and Computer Science, AmsterdamThe Mathematical Institute, Faculty of Science, Leiden University

 This thesis discusses new results in two areas within cryptography; securely transmitting a message between two parties and securely computing a function on the inputs… (more)

Subjects/Keywords: Communication complexity; Secure message transmission; Secure multi-party computation; Communication complexity; Secure message transmission; Secure multi-party computation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Haan, R. d. (2009). Algebraic techniques for low communication secure protocols. (Doctoral Dissertation). Center for Mathematics and Computer Science, AmsterdamThe Mathematical Institute, Faculty of Science, Leiden University. Retrieved from http://hdl.handle.net/1887/13603

Chicago Manual of Style (16th Edition):

Haan, Robbert de. “Algebraic techniques for low communication secure protocols.” 2009. Doctoral Dissertation, Center for Mathematics and Computer Science, AmsterdamThe Mathematical Institute, Faculty of Science, Leiden University. Accessed June 19, 2019. http://hdl.handle.net/1887/13603.

MLA Handbook (7th Edition):

Haan, Robbert de. “Algebraic techniques for low communication secure protocols.” 2009. Web. 19 Jun 2019.

Vancouver:

Haan Rd. Algebraic techniques for low communication secure protocols. [Internet] [Doctoral dissertation]. Center for Mathematics and Computer Science, AmsterdamThe Mathematical Institute, Faculty of Science, Leiden University; 2009. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1887/13603.

Council of Science Editors:

Haan Rd. Algebraic techniques for low communication secure protocols. [Doctoral Dissertation]. Center for Mathematics and Computer Science, AmsterdamThe Mathematical Institute, Faculty of Science, Leiden University; 2009. Available from: http://hdl.handle.net/1887/13603


McMaster University

10. Basu, Runki. DESIGNING A PROTOTYPE TO PROVIDE SECURE COMMUNICATION BETWEEN PHYSICIANS: A SURVEY TO EXAMINE ACCEPTABILITY AMONG USERS.

Degree: MSc, 2012, McMaster University

  OBJECTIVE: The aim of this study was to explore an alternative method of secure data exchange of patient information among physicians using their existing… (more)

Subjects/Keywords: Secure Communication; Email Exchange; Physician-Physician Communication; Provider Communication; Internet Security; Technology and Innovation; Technology and Innovation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Basu, R. (2012). DESIGNING A PROTOTYPE TO PROVIDE SECURE COMMUNICATION BETWEEN PHYSICIANS: A SURVEY TO EXAMINE ACCEPTABILITY AMONG USERS. (Masters Thesis). McMaster University. Retrieved from http://hdl.handle.net/11375/12681

Chicago Manual of Style (16th Edition):

Basu, Runki. “DESIGNING A PROTOTYPE TO PROVIDE SECURE COMMUNICATION BETWEEN PHYSICIANS: A SURVEY TO EXAMINE ACCEPTABILITY AMONG USERS.” 2012. Masters Thesis, McMaster University. Accessed June 19, 2019. http://hdl.handle.net/11375/12681.

MLA Handbook (7th Edition):

Basu, Runki. “DESIGNING A PROTOTYPE TO PROVIDE SECURE COMMUNICATION BETWEEN PHYSICIANS: A SURVEY TO EXAMINE ACCEPTABILITY AMONG USERS.” 2012. Web. 19 Jun 2019.

Vancouver:

Basu R. DESIGNING A PROTOTYPE TO PROVIDE SECURE COMMUNICATION BETWEEN PHYSICIANS: A SURVEY TO EXAMINE ACCEPTABILITY AMONG USERS. [Internet] [Masters thesis]. McMaster University; 2012. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/11375/12681.

Council of Science Editors:

Basu R. DESIGNING A PROTOTYPE TO PROVIDE SECURE COMMUNICATION BETWEEN PHYSICIANS: A SURVEY TO EXAMINE ACCEPTABILITY AMONG USERS. [Masters Thesis]. McMaster University; 2012. Available from: http://hdl.handle.net/11375/12681


Texas A&M University

11. Saez, Yessica Lisbeth. Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications.

Degree: 2015, Texas A&M University

 The Kirchhoff-law-Johnson-noise (KLJN) system is a classical physical secure key exchange scheme based on the Kirchhoff?s circuit loop law and the fluctuation-dissipation theorem of statistical… (more)

Subjects/Keywords: Security; Secure Key Exchange via Wire; Unconditional Security; Vehicular Communication Networks; Error Probability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saez, Y. L. (2015). Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/155402

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Saez, Yessica Lisbeth. “Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications.” 2015. Thesis, Texas A&M University. Accessed June 19, 2019. http://hdl.handle.net/1969.1/155402.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Saez, Yessica Lisbeth. “Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications.” 2015. Web. 19 Jun 2019.

Vancouver:

Saez YL. Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications. [Internet] [Thesis]. Texas A&M University; 2015. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1969.1/155402.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Saez YL. Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications. [Thesis]. Texas A&M University; 2015. Available from: http://hdl.handle.net/1969.1/155402

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

12. Morkel, Tayana. Image steganography applications for secure communication.

Degree: Computer Science, 2013, University of Pretoria

 To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication.… (more)

Subjects/Keywords: Image processing; Steganography; Information hiding; Computer security; Image authentication; Secure communication; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Morkel, T. (2013). Image steganography applications for secure communication. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/29906

Chicago Manual of Style (16th Edition):

Morkel, Tayana. “Image steganography applications for secure communication.” 2013. Masters Thesis, University of Pretoria. Accessed June 19, 2019. http://hdl.handle.net/2263/29906.

MLA Handbook (7th Edition):

Morkel, Tayana. “Image steganography applications for secure communication.” 2013. Web. 19 Jun 2019.

Vancouver:

Morkel T. Image steganography applications for secure communication. [Internet] [Masters thesis]. University of Pretoria; 2013. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/2263/29906.

Council of Science Editors:

Morkel T. Image steganography applications for secure communication. [Masters Thesis]. University of Pretoria; 2013. Available from: http://hdl.handle.net/2263/29906


University of Pretoria

13. [No author]. Image steganography applications for secure communication .

Degree: 2013, University of Pretoria

 To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication.… (more)

Subjects/Keywords: Image processing; Steganography; Information hiding; Computer security; Image authentication; Secure communication; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2013). Image steganography applications for secure communication . (Masters Thesis). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-11282012-124016/

Chicago Manual of Style (16th Edition):

author], [No. “Image steganography applications for secure communication .” 2013. Masters Thesis, University of Pretoria. Accessed June 19, 2019. http://upetd.up.ac.za/thesis/available/etd-11282012-124016/.

MLA Handbook (7th Edition):

author], [No. “Image steganography applications for secure communication .” 2013. Web. 19 Jun 2019.

Vancouver:

author] [. Image steganography applications for secure communication . [Internet] [Masters thesis]. University of Pretoria; 2013. [cited 2019 Jun 19]. Available from: http://upetd.up.ac.za/thesis/available/etd-11282012-124016/.

Council of Science Editors:

author] [. Image steganography applications for secure communication . [Masters Thesis]. University of Pretoria; 2013. Available from: http://upetd.up.ac.za/thesis/available/etd-11282012-124016/


KTH

14. Vorkapic, Aleksandar. Secure Blockchain Network Communication using SCION.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

The paper by Apostolaki, Zohar, and Vanbever [3] describes two routing attacks on the Bitcoin network, partition attack and delay attack. By isolating parts… (more)

Subjects/Keywords: SCION; Blockchain; Secure; Network; Communication; SCION; blockkedja; säker; nätverk; kommunikation; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vorkapic, A. (2018). Secure Blockchain Network Communication using SCION. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239924

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vorkapic, Aleksandar. “Secure Blockchain Network Communication using SCION.” 2018. Thesis, KTH. Accessed June 19, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239924.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vorkapic, Aleksandar. “Secure Blockchain Network Communication using SCION.” 2018. Web. 19 Jun 2019.

Vancouver:

Vorkapic A. Secure Blockchain Network Communication using SCION. [Internet] [Thesis]. KTH; 2018. [cited 2019 Jun 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239924.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vorkapic A. Secure Blockchain Network Communication using SCION. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239924

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Minnesota

15. Peremislov, Diana. Patient Use of the Electronic Communication Portal in Management of Type 2.

Degree: PhD, Nursing, 2015, University of Minnesota

 The high incidence and prevalence of Type 2 Diabetes require urgent attention to the management of this chronic disease. Previous studies present the advantages of… (more)

Subjects/Keywords: Conversation Theory; Electronic Communication; Electronic Health Records; Patient Portal; Secure e-Messaging; Type 2 Diabetes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peremislov, D. (2015). Patient Use of the Electronic Communication Portal in Management of Type 2. (Doctoral Dissertation). University of Minnesota. Retrieved from http://hdl.handle.net/11299/175298

Chicago Manual of Style (16th Edition):

Peremislov, Diana. “Patient Use of the Electronic Communication Portal in Management of Type 2.” 2015. Doctoral Dissertation, University of Minnesota. Accessed June 19, 2019. http://hdl.handle.net/11299/175298.

MLA Handbook (7th Edition):

Peremislov, Diana. “Patient Use of the Electronic Communication Portal in Management of Type 2.” 2015. Web. 19 Jun 2019.

Vancouver:

Peremislov D. Patient Use of the Electronic Communication Portal in Management of Type 2. [Internet] [Doctoral dissertation]. University of Minnesota; 2015. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/11299/175298.

Council of Science Editors:

Peremislov D. Patient Use of the Electronic Communication Portal in Management of Type 2. [Doctoral Dissertation]. University of Minnesota; 2015. Available from: http://hdl.handle.net/11299/175298


Brno University of Technology

16. Ferek, Matúš. Bezpečená komunikace mezi data loggerem a databazovým serverem .

Degree: 2011, Brno University of Technology

 Táto práca je zameraná na analýzu bezpečnostných rizík pri prenose dát v sieti Internet a navrhnutie niekoľkých možných riešení zabezpečenia komunikácie medzi jednotkou zberu dát… (more)

Subjects/Keywords: Bezpečnosť; kryptografia; šifrovanie; SSH; SSL; zabezpečená komunikácia.; Security; cryptography; encryption; SSH; SSL; secure communication.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ferek, M. (2011). Bezpečená komunikace mezi data loggerem a databazovým serverem . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/14972

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ferek, Matúš. “Bezpečená komunikace mezi data loggerem a databazovým serverem .” 2011. Thesis, Brno University of Technology. Accessed June 19, 2019. http://hdl.handle.net/11012/14972.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ferek, Matúš. “Bezpečená komunikace mezi data loggerem a databazovým serverem .” 2011. Web. 19 Jun 2019.

Vancouver:

Ferek M. Bezpečená komunikace mezi data loggerem a databazovým serverem . [Internet] [Thesis]. Brno University of Technology; 2011. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/11012/14972.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ferek M. Bezpečená komunikace mezi data loggerem a databazovým serverem . [Thesis]. Brno University of Technology; 2011. Available from: http://hdl.handle.net/11012/14972

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

17. Buno, Petr. Optimalizace komumikačních protokolů .

Degree: 2015, Brno University of Technology

 Tato práce se zabývá problematikou inteligentní domácnosti, analyzuje existující řešení a zaměřuje se na systém vyvíjený ve spolupráci s FIT VUT v Brně. Důraz je… (more)

Subjects/Keywords: Domácí automatizace; inteligentní domácnost; komunikační protokol; zabezpečená komunikace; Home automation; smart home; communication protocol; secure communication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Buno, P. (2015). Optimalizace komumikačních protokolů . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/64070

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Buno, Petr. “Optimalizace komumikačních protokolů .” 2015. Thesis, Brno University of Technology. Accessed June 19, 2019. http://hdl.handle.net/11012/64070.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Buno, Petr. “Optimalizace komumikačních protokolů .” 2015. Web. 19 Jun 2019.

Vancouver:

Buno P. Optimalizace komumikačních protokolů . [Internet] [Thesis]. Brno University of Technology; 2015. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/11012/64070.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Buno P. Optimalizace komumikačních protokolů . [Thesis]. Brno University of Technology; 2015. Available from: http://hdl.handle.net/11012/64070

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Syracuse University

18. Zou, Shaofeng. Nonparametric Anomaly Detection and Secure Communication.

Degree: PhD, Electrical Engineering and Computer Science, 2016, Syracuse University

  Two major security challenges in information systems are detection of anomalous data patterns that reflect malicious intrusions into data storage systems and protection of… (more)

Subjects/Keywords: degraded broadcast channel; distribution-free test; kernel mean embedding; nonparametric anomaly detection; secrecy capacity region; secure communication; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zou, S. (2016). Nonparametric Anomaly Detection and Secure Communication. (Doctoral Dissertation). Syracuse University. Retrieved from https://surface.syr.edu/etd/467

Chicago Manual of Style (16th Edition):

Zou, Shaofeng. “Nonparametric Anomaly Detection and Secure Communication.” 2016. Doctoral Dissertation, Syracuse University. Accessed June 19, 2019. https://surface.syr.edu/etd/467.

MLA Handbook (7th Edition):

Zou, Shaofeng. “Nonparametric Anomaly Detection and Secure Communication.” 2016. Web. 19 Jun 2019.

Vancouver:

Zou S. Nonparametric Anomaly Detection and Secure Communication. [Internet] [Doctoral dissertation]. Syracuse University; 2016. [cited 2019 Jun 19]. Available from: https://surface.syr.edu/etd/467.

Council of Science Editors:

Zou S. Nonparametric Anomaly Detection and Secure Communication. [Doctoral Dissertation]. Syracuse University; 2016. Available from: https://surface.syr.edu/etd/467


University of Technology, Sydney

19. Ambu Saidi, Mohammed Abdullah Saud. Feature selection using mutual information in network intrusion detection system.

Degree: 2015, University of Technology, Sydney

 Network technologies have made significant progress in development, while the security issues alongside these technologies have not been well addressed. Current research on network security… (more)

Subjects/Keywords: Network technologies.; Secure communication protocols.; Intrusion Detection Systems (IDSs).; Flexible Mutual Information Feature Selection (FMIFS).; Hybrid feature selection algorithm.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ambu Saidi, M. A. S. (2015). Feature selection using mutual information in network intrusion detection system. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/43389

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ambu Saidi, Mohammed Abdullah Saud. “Feature selection using mutual information in network intrusion detection system.” 2015. Thesis, University of Technology, Sydney. Accessed June 19, 2019. http://hdl.handle.net/10453/43389.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ambu Saidi, Mohammed Abdullah Saud. “Feature selection using mutual information in network intrusion detection system.” 2015. Web. 19 Jun 2019.

Vancouver:

Ambu Saidi MAS. Feature selection using mutual information in network intrusion detection system. [Internet] [Thesis]. University of Technology, Sydney; 2015. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/10453/43389.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ambu Saidi MAS. Feature selection using mutual information in network intrusion detection system. [Thesis]. University of Technology, Sydney; 2015. Available from: http://hdl.handle.net/10453/43389

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Louisville

20. Xie, Bin, 1970-. On secure communication in integrated internet and heterogeneous multi-hop wireless networks.

Degree: PhD, 2006, University of Louisville

 Integration of the Internet with a Cellular Network, WMAN, WLAN, and MANET presents an exceptional promise by having co-existence of conventional WWANs/WMANs/WLANs with wireless ad… (more)

Subjects/Keywords: Secure communication; Internet; Wireless networks; Multihop wireless networks; MANET

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, Bin, 1. (2006). On secure communication in integrated internet and heterogeneous multi-hop wireless networks. (Doctoral Dissertation). University of Louisville. Retrieved from 10.18297/etd/1601 ; https://ir.library.louisville.edu/etd/1601

Chicago Manual of Style (16th Edition):

Xie, Bin, 1970-. “On secure communication in integrated internet and heterogeneous multi-hop wireless networks.” 2006. Doctoral Dissertation, University of Louisville. Accessed June 19, 2019. 10.18297/etd/1601 ; https://ir.library.louisville.edu/etd/1601.

MLA Handbook (7th Edition):

Xie, Bin, 1970-. “On secure communication in integrated internet and heterogeneous multi-hop wireless networks.” 2006. Web. 19 Jun 2019.

Vancouver:

Xie, Bin 1. On secure communication in integrated internet and heterogeneous multi-hop wireless networks. [Internet] [Doctoral dissertation]. University of Louisville; 2006. [cited 2019 Jun 19]. Available from: 10.18297/etd/1601 ; https://ir.library.louisville.edu/etd/1601.

Council of Science Editors:

Xie, Bin 1. On secure communication in integrated internet and heterogeneous multi-hop wireless networks. [Doctoral Dissertation]. University of Louisville; 2006. Available from: 10.18297/etd/1601 ; https://ir.library.louisville.edu/etd/1601


KTH

21. Kathirvel, Anitha. Efficient Privacy Preserving Key Management for Public Cloud Networks.

Degree: Radio Systems Laboratory (RS Lab), 2014, KTH

Most applications and documents are stored in a public cloud for storage and management purposes in a cloud computing environment. The major advantages of… (more)

Subjects/Keywords: Cloud storage; Secure Storage; Key Management scheme; access level security; Cloud Storage; säker förvaring; nyckelhantering schema; åtkomstnivå säkerhet; Communication Systems; Kommunikationssystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kathirvel, A. (2014). Efficient Privacy Preserving Key Management for Public Cloud Networks. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kathirvel, Anitha. “Efficient Privacy Preserving Key Management for Public Cloud Networks.” 2014. Thesis, KTH. Accessed June 19, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kathirvel, Anitha. “Efficient Privacy Preserving Key Management for Public Cloud Networks.” 2014. Web. 19 Jun 2019.

Vancouver:

Kathirvel A. Efficient Privacy Preserving Key Management for Public Cloud Networks. [Internet] [Thesis]. KTH; 2014. [cited 2019 Jun 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kathirvel A. Efficient Privacy Preserving Key Management for Public Cloud Networks. [Thesis]. KTH; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

22. Nikitin, Kirill. DTLS Adaptation for Efficient Secure Group Communication.

Degree: Information and Communication Technology (ICT), 2015, KTH

The Internet has been growing rapidly during the past threedecades, evolving into a new paradigm called the Internet ofThings where all electronic devices are… (more)

Subjects/Keywords: DTLS; secure group communication; multicast; Internet of Things; efficient security; DTLS; säker gruppkommunikation; multicast; Internet of Things; effektiv säkerhet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nikitin, K. (2015). DTLS Adaptation for Efficient Secure Group Communication. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nikitin, Kirill. “DTLS Adaptation for Efficient Secure Group Communication.” 2015. Thesis, KTH. Accessed June 19, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nikitin, Kirill. “DTLS Adaptation for Efficient Secure Group Communication.” 2015. Web. 19 Jun 2019.

Vancouver:

Nikitin K. DTLS Adaptation for Efficient Secure Group Communication. [Internet] [Thesis]. KTH; 2015. [cited 2019 Jun 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nikitin K. DTLS Adaptation for Efficient Secure Group Communication. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

23. Bude, Cristian. Internet of Things : Exploring and Securing a Future Concept.

Degree: Radio Systems Laboratory (RS Lab), 2015, KTH

Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive… (more)

Subjects/Keywords: Internet of Things; IoT; information security; identification; authentication; secure communication; Internet of Things; IoT; informationssäkerhet; identifiering; autentisering; säker kommunikation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bude, C. (2015). Internet of Things : Exploring and Securing a Future Concept. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bude, Cristian. “Internet of Things : Exploring and Securing a Future Concept.” 2015. Thesis, KTH. Accessed June 19, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bude, Cristian. “Internet of Things : Exploring and Securing a Future Concept.” 2015. Web. 19 Jun 2019.

Vancouver:

Bude C. Internet of Things : Exploring and Securing a Future Concept. [Internet] [Thesis]. KTH; 2015. [cited 2019 Jun 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bude C. Internet of Things : Exploring and Securing a Future Concept. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Rizki, Kiki. Efficient Group Key Management for Internet of Things.

Degree: Electrical Engineering (EES), 2016, KTH

The Internet of Things has become the next big step of a general Internetevolution, and conveys the assurance of security as one of the… (more)

Subjects/Keywords: GREP; group key management; secure group communication; Internet of Things; GREP; gruppnyckelhantering; säker gruppkommunikation; Internet of Things

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rizki, K. (2016). Efficient Group Key Management for Internet of Things. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194504

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rizki, Kiki. “Efficient Group Key Management for Internet of Things.” 2016. Thesis, KTH. Accessed June 19, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194504.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rizki, Kiki. “Efficient Group Key Management for Internet of Things.” 2016. Web. 19 Jun 2019.

Vancouver:

Rizki K. Efficient Group Key Management for Internet of Things. [Internet] [Thesis]. KTH; 2016. [cited 2019 Jun 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194504.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rizki K. Efficient Group Key Management for Internet of Things. [Thesis]. KTH; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194504

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

25. Bučko, Kristián. Implementace modelu OMG/DDS a analýza komunikace .

Degree: 2019, Brno University of Technology

 V bakalárskej práci je predstavenie OMG DDS špecifikácie, teoretické porovnanie troch najrozšírenejších implementácií OpenDDS, Vortex Opensplice a taktiež RTI Connext. V práci sú taktiež popísané… (more)

Subjects/Keywords: Zabezpečená; nezabezpečená; komunikácia; analýza; autentifikácia; DDS; OMG; RTPS; RTI; OpenSSL; Secure; unsecure; communication; analysis; authentication; DDS; OMG; RTPS; RTI; OpenSSL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bučko, K. (2019). Implementace modelu OMG/DDS a analýza komunikace . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/173550

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bučko, Kristián. “Implementace modelu OMG/DDS a analýza komunikace .” 2019. Thesis, Brno University of Technology. Accessed June 19, 2019. http://hdl.handle.net/11012/173550.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bučko, Kristián. “Implementace modelu OMG/DDS a analýza komunikace .” 2019. Web. 19 Jun 2019.

Vancouver:

Bučko K. Implementace modelu OMG/DDS a analýza komunikace . [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/11012/173550.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bučko K. Implementace modelu OMG/DDS a analýza komunikace . [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/173550

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Ly, Hung Dinh. Information-Theoretically Secure Communication Under Channel Uncertainty.

Degree: 2012, Texas A&M University

Secure communication under channel uncertainty is an important and challenging problem in physical-layer security and cryptography. In this dissertation, we take a fundamental information-theoretic view… (more)

Subjects/Keywords: Channel uncertainty; secure communication; MIMO secure communication; security embedding; secure symmetrical multilevel diversity coding; secure distributed storage systems; physical-layer security

…asymptotically perfectly secure communication. This result was later extended to the general broadcast… …recent progress in this field. C. Dissertation Outline Secure communication under channel… …settings and use them to shed insight into efficient secure communication techniques for… …viii CHAPTER Page C. Secure Symmetrical Multilevel Diversity Coding 1. Problem… …wireless communication: any receiver within the transmission range can listen to the transmission… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ly, H. D. (2012). Information-Theoretically Secure Communication Under Channel Uncertainty. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10822

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ly, Hung Dinh. “Information-Theoretically Secure Communication Under Channel Uncertainty.” 2012. Thesis, Texas A&M University. Accessed June 19, 2019. http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10822.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ly, Hung Dinh. “Information-Theoretically Secure Communication Under Channel Uncertainty.” 2012. Web. 19 Jun 2019.

Vancouver:

Ly HD. Information-Theoretically Secure Communication Under Channel Uncertainty. [Internet] [Thesis]. Texas A&M University; 2012. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10822.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ly HD. Information-Theoretically Secure Communication Under Channel Uncertainty. [Thesis]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10822

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université de Grenoble

27. Sanchez Torres, José Libardo. Vulnérabilité, interdépendance et analyse des risques des postes sources et des modes d’exploitation décentralisés des réseaux électriques : Vulnerability, interdependencies and risk analysis of coupled infrastructures : power distribution network and ICT.

Degree: Docteur es, Génie électrique, 2013, Université de Grenoble

Au vu de l’utilisation croissante des technologies de l’information et de la communication dans les réseaux électriques, il est indispensable d’étudier l’étroite liaison entre ces… (more)

Subjects/Keywords: Infrastructures critiques; Interdépendances; Réseau électrique; Réseau de communication; Réseaux complexes; Systèmes couplés; Technologies de l’information et de la communication; Vulnérabilités; Critical infrastructures; Nterdependence; Power grid; Secure operation; Vulnerability; 620

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sanchez Torres, J. L. (2013). Vulnérabilité, interdépendance et analyse des risques des postes sources et des modes d’exploitation décentralisés des réseaux électriques : Vulnerability, interdependencies and risk analysis of coupled infrastructures : power distribution network and ICT. (Doctoral Dissertation). Université de Grenoble. Retrieved from http://www.theses.fr/2013GRENT104

Chicago Manual of Style (16th Edition):

Sanchez Torres, José Libardo. “Vulnérabilité, interdépendance et analyse des risques des postes sources et des modes d’exploitation décentralisés des réseaux électriques : Vulnerability, interdependencies and risk analysis of coupled infrastructures : power distribution network and ICT.” 2013. Doctoral Dissertation, Université de Grenoble. Accessed June 19, 2019. http://www.theses.fr/2013GRENT104.

MLA Handbook (7th Edition):

Sanchez Torres, José Libardo. “Vulnérabilité, interdépendance et analyse des risques des postes sources et des modes d’exploitation décentralisés des réseaux électriques : Vulnerability, interdependencies and risk analysis of coupled infrastructures : power distribution network and ICT.” 2013. Web. 19 Jun 2019.

Vancouver:

Sanchez Torres JL. Vulnérabilité, interdépendance et analyse des risques des postes sources et des modes d’exploitation décentralisés des réseaux électriques : Vulnerability, interdependencies and risk analysis of coupled infrastructures : power distribution network and ICT. [Internet] [Doctoral dissertation]. Université de Grenoble; 2013. [cited 2019 Jun 19]. Available from: http://www.theses.fr/2013GRENT104.

Council of Science Editors:

Sanchez Torres JL. Vulnérabilité, interdépendance et analyse des risques des postes sources et des modes d’exploitation décentralisés des réseaux électriques : Vulnerability, interdependencies and risk analysis of coupled infrastructures : power distribution network and ICT. [Doctoral Dissertation]. Université de Grenoble; 2013. Available from: http://www.theses.fr/2013GRENT104


University of Victoria

28. Ghoreishi Madiseh, Masoud. Wireless secret key generation versus capable adversaries.

Degree: Dept. of Electrical and Computer Engineering, 2011, University of Victoria

 This dissertation applies theories and concepts of wireless communications and signal processing to the security domain to assess the security of a Wireless secret Key… (more)

Subjects/Keywords: Wireless Secret Key Generation; Wireless Security; Point to Point Secure Communication; Secret Key Capacity; Wire-tap channel; Public Discussion; Wireless Channel Characterization; Ultrawide Band communication channels; WLAN; IEEE 802.11

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghoreishi Madiseh, M. (2011). Wireless secret key generation versus capable adversaries. (Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/3766

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ghoreishi Madiseh, Masoud. “Wireless secret key generation versus capable adversaries.” 2011. Thesis, University of Victoria. Accessed June 19, 2019. http://hdl.handle.net/1828/3766.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ghoreishi Madiseh, Masoud. “Wireless secret key generation versus capable adversaries.” 2011. Web. 19 Jun 2019.

Vancouver:

Ghoreishi Madiseh M. Wireless secret key generation versus capable adversaries. [Internet] [Thesis]. University of Victoria; 2011. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/1828/3766.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ghoreishi Madiseh M. Wireless secret key generation versus capable adversaries. [Thesis]. University of Victoria; 2011. Available from: http://hdl.handle.net/1828/3766

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. KURIAN P AJEESH. Performance analysis of filtering based chaotic synchronization and development of chaotic digital communication schemes.

Degree: 2006, National University of Singapore

Subjects/Keywords: Chaotic Systems; Synchronization; Predictive Filtering; divergence behavior; Secure Communication; Chaotic Communication Schemes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

AJEESH, K. P. (2006). Performance analysis of filtering based chaotic synchronization and development of chaotic digital communication schemes. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/15571

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

AJEESH, KURIAN P. “Performance analysis of filtering based chaotic synchronization and development of chaotic digital communication schemes.” 2006. Thesis, National University of Singapore. Accessed June 19, 2019. http://scholarbank.nus.edu.sg/handle/10635/15571.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

AJEESH, KURIAN P. “Performance analysis of filtering based chaotic synchronization and development of chaotic digital communication schemes.” 2006. Web. 19 Jun 2019.

Vancouver:

AJEESH KP. Performance analysis of filtering based chaotic synchronization and development of chaotic digital communication schemes. [Internet] [Thesis]. National University of Singapore; 2006. [cited 2019 Jun 19]. Available from: http://scholarbank.nus.edu.sg/handle/10635/15571.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

AJEESH KP. Performance analysis of filtering based chaotic synchronization and development of chaotic digital communication schemes. [Thesis]. National University of Singapore; 2006. Available from: http://scholarbank.nus.edu.sg/handle/10635/15571

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Indian Institute of Science

30. Rahul, S. Algorithms For Efficient Implementation Of Secure Group Communication Systems.

Degree: 2004, Indian Institute of Science

 A distributed application may be considered as a set of nodes which are spread across the network, and need to communicate with each other. The… (more)

Subjects/Keywords: Electrical Communication Engineering; Computer Communication Protocol; Computer Communication - Security; Secure Group Communication Systems (SGCS); Distributed Group Key Management Algorithm; Safe Delivery Rule; Group Communication Systems; Client-Server Group Communication Systems; Electrical Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rahul, S. (2004). Algorithms For Efficient Implementation Of Secure Group Communication Systems. (Thesis). Indian Institute of Science. Retrieved from http://hdl.handle.net/2005/315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rahul, S. “Algorithms For Efficient Implementation Of Secure Group Communication Systems.” 2004. Thesis, Indian Institute of Science. Accessed June 19, 2019. http://hdl.handle.net/2005/315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rahul, S. “Algorithms For Efficient Implementation Of Secure Group Communication Systems.” 2004. Web. 19 Jun 2019.

Vancouver:

Rahul S. Algorithms For Efficient Implementation Of Secure Group Communication Systems. [Internet] [Thesis]. Indian Institute of Science; 2004. [cited 2019 Jun 19]. Available from: http://hdl.handle.net/2005/315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rahul S. Algorithms For Efficient Implementation Of Secure Group Communication Systems. [Thesis]. Indian Institute of Science; 2004. Available from: http://hdl.handle.net/2005/315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.