Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(timed release encryption key encapsulation mechanism data encapsulation mechanism encapsulated key escrow ciphertext indistinguishability under chosen plaintext attacks AND adaptive chosen ciphertext attacks random Oracle model standard model). Showing records 1 – 4 of 4 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Queensland University of Technology

1. Rangasamy, Jothi Ramalingam. Cryptographic techniques for managing computational effort.

Degree: 2012, Queensland University of Technology

 Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential… (more)

Subjects/Keywords: denial-of-service, denial-of-service resilience, cryptographic puzzles, time-lock puzzles, puzzle-unforgeability, puzzle-diculty, non-parallelisability, mutual authentication, bernstein's signatures, secure sockets layer (ssl), public-key encryptionript:; timed-release encryption, key encapsulation mechanism, data encapsulation mechanism, encapsulated key escrow, ciphertext indistinguishability under chosen plaintext attacks and adaptive chosen ciphertext attacks, random Oracle model, standard model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rangasamy, J. R. (2012). Cryptographic techniques for managing computational effort. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/61007/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rangasamy, Jothi Ramalingam. “Cryptographic techniques for managing computational effort.” 2012. Thesis, Queensland University of Technology. Accessed November 20, 2019. https://eprints.qut.edu.au/61007/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rangasamy, Jothi Ramalingam. “Cryptographic techniques for managing computational effort.” 2012. Web. 20 Nov 2019.

Vancouver:

Rangasamy JR. Cryptographic techniques for managing computational effort. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2019 Nov 20]. Available from: https://eprints.qut.edu.au/61007/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rangasamy JR. Cryptographic techniques for managing computational effort. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/61007/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université de Montréal

2. Lamontagne, Philippe. Méthodes pour la réduction d’attaques actives à passives en cryptographie quantique .

Degree: 2018, Université de Montréal

Subjects/Keywords: cryptographie quantique; mise en gage; cut-and-choose; tirage d'une pièce; échantillonnage quantique; certification d'états mixtes; attaques (non) adaptives; modèle à mémoire bornée/bruitée; quantum cryptography; bit commitment; coin-tossing; quantum sampling; mixed state certification; (non-)adaptive attacks; bounded/noisy storage model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lamontagne, P. (2018). Méthodes pour la réduction d’attaques actives à passives en cryptographie quantique . (Thesis). Université de Montréal. Retrieved from http://hdl.handle.net/1866/21142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lamontagne, Philippe. “Méthodes pour la réduction d’attaques actives à passives en cryptographie quantique .” 2018. Thesis, Université de Montréal. Accessed November 20, 2019. http://hdl.handle.net/1866/21142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lamontagne, Philippe. “Méthodes pour la réduction d’attaques actives à passives en cryptographie quantique .” 2018. Web. 20 Nov 2019.

Vancouver:

Lamontagne P. Méthodes pour la réduction d’attaques actives à passives en cryptographie quantique . [Internet] [Thesis]. Université de Montréal; 2018. [cited 2019 Nov 20]. Available from: http://hdl.handle.net/1866/21142.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lamontagne P. Méthodes pour la réduction d’attaques actives à passives en cryptographie quantique . [Thesis]. Université de Montréal; 2018. Available from: http://hdl.handle.net/1866/21142

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Al-Turki, Musab A. Rewriting-based formal modeling, analysis and implementation of real-time distributed services.

Degree: PhD, 0112, 2011, University of Illinois – Urbana-Champaign

 The last decade has seen an explosive growth of both: (1) enterprise service-oriented software systems, for managing enterprise resources and automating business processes, and (2)… (more)

Subjects/Keywords: Rewriting Logic; Maude; Orc; Formal Semantics; Formal Analysis; Distributed Systems; Web Services; Formal Implementation; Real-Time Systems; Orc; Service Orchestration; Service Availability; Denial of Service Attacks; Statistical Model Checking; Adaptive Selective Verification; PVeStA; MOrc

…Orc defines an elegant theory and programming model for timed service compositions that… …provide a clean and efficient formal model for timed orchestration design and analysis. The… …approach to the formal statistical analysis of availability of services under DoS attacks of… …discusses the assumptions under which statistical model-checking analysis can be applied. This is… …bounded and time-unbounded LTL model checking (the command mc). For timed modules with… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Turki, M. A. (2011). Rewriting-based formal modeling, analysis and implementation of real-time distributed services. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/26231

Chicago Manual of Style (16th Edition):

Al-Turki, Musab A. “Rewriting-based formal modeling, analysis and implementation of real-time distributed services.” 2011. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed November 20, 2019. http://hdl.handle.net/2142/26231.

MLA Handbook (7th Edition):

Al-Turki, Musab A. “Rewriting-based formal modeling, analysis and implementation of real-time distributed services.” 2011. Web. 20 Nov 2019.

Vancouver:

Al-Turki MA. Rewriting-based formal modeling, analysis and implementation of real-time distributed services. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2011. [cited 2019 Nov 20]. Available from: http://hdl.handle.net/2142/26231.

Council of Science Editors:

Al-Turki MA. Rewriting-based formal modeling, analysis and implementation of real-time distributed services. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/26231

4. Barna, Cornel. Engineering Model-Based Adaptive Software Systems.

Degree: PhD, Computer Science, 2016, York University

Adaptive software systems are able to cope with changes in the environment by self-adjusting their structure and behavior. Robustness refers to the ability of the… (more)

Subjects/Keywords: Computer science; Adaptive systems; Autonomic computing; Autonomic system; Cloud computing; Control theory; Decision making; Denial of service attacks; Performance models; Performance testing; Performance; Software architectures; Software engineering; Software; Stress testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barna, C. (2016). Engineering Model-Based Adaptive Software Systems. (Doctoral Dissertation). York University. Retrieved from http://hdl.handle.net/10315/32198

Chicago Manual of Style (16th Edition):

Barna, Cornel. “Engineering Model-Based Adaptive Software Systems.” 2016. Doctoral Dissertation, York University. Accessed November 20, 2019. http://hdl.handle.net/10315/32198.

MLA Handbook (7th Edition):

Barna, Cornel. “Engineering Model-Based Adaptive Software Systems.” 2016. Web. 20 Nov 2019.

Vancouver:

Barna C. Engineering Model-Based Adaptive Software Systems. [Internet] [Doctoral dissertation]. York University; 2016. [cited 2019 Nov 20]. Available from: http://hdl.handle.net/10315/32198.

Council of Science Editors:

Barna C. Engineering Model-Based Adaptive Software Systems. [Doctoral Dissertation]. York University; 2016. Available from: http://hdl.handle.net/10315/32198

.