Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(which provides key agreement scheme over an unsecured channel Further). Showing records 1 – 30 of 14783 total matches.

[1] [2] [3] [4] [5] … [493]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters


Brno University of Technology

1. Fujdiak, Radek. Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy.

Degree: 2018, Brno University of Technology

Telemetry system, Optimisation, Sensoric networks, Smart Grid, Internet of Things, Sensors, Information security, Cryptography, Cryptography algorithms, Cryptosystem, Confidentiality, Integrity, Authentication, Data freshness, Non-Repudiation. Advisors/Committee Members: Mišurec, Jiří (advisor), Orgoň, Miloš (referee), Pitner,, Tomáš (referee).

Subjects/Keywords: Dizertační práce se zabývá výzkumem v oblasti optimalizace telemetrických systémů v energetice z pohledu informační bezpečnosti. Práce pojednává o současných problémech informační bezpečnosti; její definici a i o metodách; které vedou k naplnění bezpečnostních principů; a soustředí se zejména na oblast; kde jsou využívány zařízení s omezenými zdroji To z toho důvodu; že zařízení s limitovanými zdroji; tj. operační paměť; omezený přístup k elektrické energii; výkon; aj.; představují bezpečnostní rizika; která mohou ovlivňovat následně celou energetickou infrastrukturu v případě nasazení technologií v konceptu inteligentních sítí. Jsou přiblíženy dnešní vědecké výzvy v této oblasti; objasněna terminologie i legislativa; která je pro tuto oblast také velice zásadní. Hlavní část dizertační práce je následně věnována výzkumu vlastního hybridního řešení; kryptosystému. Jedná se o řešení; které nenaplňuje pouze jeden bezpečnostní princip (např. pouze autentičnost); nýbrž o řešení; které nabízí všechny požadované principy informační bezpečnosti v energetice. Je provedena hloubková analýza dnešních řešení; které jsou následně evaluovány vlastními měřeními i pomocí současné aktuální literatury. Následně je proveden návrh kombinací symetrických a asymetrických kryptografických algoritmů; tak aby byla zaručena efektivita výsledného systému; ale také zachována jeho komplexnost systému. Jedná se o kombinaci symetrických blokových algoritmů elektronické kódové knihy; zajišťující autentizaci a integritu pomocí náhodných klíčů; řetězení šifrovaného textu zajišťující důvěrnost; společně s algoritmem Diffieho-Hellmana nad eliptickými křivkami zajišťující bezpečnou distribuci a výměnu symetrických tajných klíčů. V neposlední řadě je přiblížen provedený vlastní vývoj a optimalizace hybridního kryptosystému. Je představeno vlastní řešení pro reprezentaci velkých čísel a modulární algebru v zařízení s limitovanými zdroji; které je ověřeno experimentálními měřeními. Dále je rozebrán vlastní návrh; validace a optimalizace řešení náhodných hardwarových generátorů (založených na efektivním principu kvantizační chyby a protichůdných oscilátorů). Je také řešena navržená část symetrické kryptografie; kde je využito dvou dostupných knihoven; které jsou následně znatelně optimalizovány. V neposlední řadě je představen provedený rozsáhlý výzkum kryptografie eliptických křivek a možností distribuce symetrického klíče. Jsou implementovány algoritmy pro výpočty s body eliptických křivek nad polem s prvočíselným řádem i nad polem řádu 2. Realizace pak zahrnovala více než 50 eliptických křivek různých standardů; kde největším úspěchem jsou křivky nad polem prvočísel o řádu p = 256. Tyto křivky v době řešení nebyly na takto hardwarových platformách řešeny. Nakonec jsou představeny originální výsledky výzkumu; který se zabýval vhodnou volbou křivek a studií jejich doménových parametrů z pohledu vztahu velikosti k rychlosti operací nad křivkou.; The dissertation thesis focuses on research in the optimisation of telemetry systems in energy from the perspective of information security. The thesis deals with nowadays challenges in information security; its definition as well as its methods. The main focus is on the area; where devices with limited resources such as memory or computational power are used. These devices pose security risks that may affect the entire smart grid infrastructure. Nowadays research challenges terminology and legislative; which is crucial in the defined area; are brought closer. The main part of this thesis is devoted to the research of the author’s own hybrid solution – the hybrid cryptosystem. The solution fulfils all necessary principles of information security – authenticity; confidentiality; integrity and data freshness. An analysis of today’s solutions is provided together with a complex evaluation based on own experimental measurements and available literature sources. Subsequently; a combination of symmetric and asymmetric cryptography algorithms is designed that provides both high efficiency and complexity. It is a combination of the symmetric block cyphers Electronic Code Book; which provides authenticity and integrity by using random keys; Cipher Block Chaining; which provided confidentiality; and the asymmetric algorithm of Diffie-Hellman over Elliptic Curves; which provides key agreement scheme over an unsecured channel. Further; the development and optimisation of the hybrid cryptosystem are brought in light. The proprietary solution of large number representation and modular algebra in a device with limited resources is presented and validated via own experimental measurements. Moreover; the own design is analysed and the two proposed hardware generators (based on efficient methods of quantization error and opposing oscillators) are evaluated and optimised. Additionally; the symmetric part of the cryptosystem is also investigated; where two main solutions are highly optimised. Last but not least; deep research on the cryptography of elliptic curves and the key distribution scheme is presented. Two main curve types are dealt with – over a finite field and over a field of characteristic two. The implementation included more than 50 elliptic curves of different standards. The implementation of the curves of order p = 256 has the highest impact. These curves were not addressed on such devices at the time of solution. Finally; the original research results of possible speed optimisation via using special elliptic curves are introduced. The relationship between curve domain parameters and point computational efficiency is studied. This last part brings also promising results for the field of effective cryptographic algorithm – the lightweight cryptography.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fujdiak, R. (2018). Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/69305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fujdiak, Radek. “Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy.” 2018. Thesis, Brno University of Technology. Accessed January 26, 2021. http://hdl.handle.net/11012/69305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fujdiak, Radek. “Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy.” 2018. Web. 26 Jan 2021.

Vancouver:

Fujdiak R. Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/11012/69305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fujdiak R. Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice: Analysis and Optimization of Data Communication for Telemetric Systems in Energy. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/69305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


AUT University

2. Yang, Mee Loong. An authenticated key agreement scheme for sensor networks .

Degree: AUT University

 In wireless sensor networks, the messages between pairs of communicating nodes are open to eavesdropping, tampering, and forgeries. These messages can easily be protected using… (more)

Subjects/Keywords: Key agreement scheme; Sensor networks; Security; Blom's scheme

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, M. L. (n.d.). An authenticated key agreement scheme for sensor networks . (Thesis). AUT University. Retrieved from http://hdl.handle.net/10292/7855

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yang, Mee Loong. “An authenticated key agreement scheme for sensor networks .” Thesis, AUT University. Accessed January 26, 2021. http://hdl.handle.net/10292/7855.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yang, Mee Loong. “An authenticated key agreement scheme for sensor networks .” Web. 26 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Yang ML. An authenticated key agreement scheme for sensor networks . [Internet] [Thesis]. AUT University; [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10292/7855.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Yang ML. An authenticated key agreement scheme for sensor networks . [Thesis]. AUT University; Available from: http://hdl.handle.net/10292/7855

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

3. Tay, Noel Nuo Wi. Human-centric Semantic Reasoning and Optimization for Smart Home : スマートホームのための人間中心セマンティック推論と最適化.

Degree: 博士(工学), 2017, Tokyo Metropolitan University / 首都大学東京

首都大学東京, 2017-03-25, 博士(工学)

Subjects/Keywords: Smart home consists of various kinds of Internet of Tings (IoT) devices connected to the private house that cooperatively provide inhabitants (users) with proactive services related to comfort; security and safety. Examples of services include 1) manipulation of lighting and temperature based on time and context; 2) reminder service of user’s schedules by using the nearest output device; and 3) device organization to realize surveillance system. However; current smart homes are developed mostly from the viewpoint of technical capabilities; where users have to decide how the connected devices are going to serve them. They may have to setup the devices based on the available functionalities and specifications of the devices; and also have to alter their living styles according to the role of each device. Besides; most devices can only provide simple services independently. Œus; cooperation among the devices is important. On the other hand; human-centric approach; which centered on humans’ need to enhance their living experience; is an important technological paradigm where services are provided anywhere and anytime based on situation. Smart home abiding this approach should cooperatively maximize fulfillment of quality of life (QOL) for individual users subject to personal constraints. In this respect; the devices are bound to enable communication of information; and their operations are coordinated to deliver services cooperatively via a sequence of device actions called a plan. Due to personalization and automation; a number of problems have to be solved. First; a means of automatic binding between loosely coupled devices depending on services delivered have to be devised; as manual setup is impractical. Secondly; coordination of devices needs to generate complex plans; without requiring manual specification of sub-plans. Besides; issue of over-constrained goals during service provisions that arises from flawed or contradicting specification from multiple users should be considered. Apart from that; low training data in general environment setting for individual identification should be addressed. The aim of this research is to establish an integrated system for the human-centric smart home (HcSH) that provides personalized service through loosely coupled devices automatically. This research modularizes the overall system into three modules; which are human identification (HIM); automated planner (APM); and semantic reasoner (SRM). HIM helps select the appropriate QOL; SRM binds the devices by associating them with planning components; which are then used by APM to generate plans for device coordination to maximize QOL fulfillment. Chapter 1 gives the introduction and design motivation. Chapter 2 presents the related works and literature reviews; as well as justifications relevant to this thesis. Chapter 3 deals with HIM; which is realized via face identification. For face identification; problems faced are heavy computational load and insufficient learning data. The solution is to use transfer learning to handle data issue while being able to build generalized face model. For face model refinement; active learning is implemented. Experimental results show the method is competitive in terms of accuracy and computational cost compared to current state of the art. Chapter 4 presents APM; where planning via solving Constraint Satisfaction Problem (CSP) is laid out. CSP in planning is declarative without requiring prior specification of sub-plans; and can handle variables of larger domains. Due to the high possibility of having over-constrained QOL as in practical cases; CSP planner cannot fulfill all of them. An example is a contradicting TV channel request from 2 persons. Optimization through weighted CSP is therefore used to maximize QOL fulfillment. Experiments on weighted CSP shows that the method is capable of performing optimization while generating complex plans. Chapter 5 is on SRM; where knowledge representation is constructed by Web Ontology Language (OWL) description logic. It models knowledge on home and building layout and device functionalities. OWL is used because it is decidable and that it is endorsed by World Wide Web Consortium (W3C). We deal with case studies based on further inference on building state as an important example to discuss the applicability of the proposed method; and demonstrate the use of building ontology. This is followed by automated device binding and the method to generate basic planning components of rules in automated planning. Finally; an extension to robot complex planning is provided to demonstrate how it can be easily extended. Chapter 6 demonstrates the applicability of the HcSH; which integrates all three modules through its implementation in a prototype smart home with 5 rooms; which houses 2 persons. Various tests are performed to show the generated plans are near optimal without redundancy. Œe system is also shown to be scalable given increasing amount of devices. Case studies show that the system can perform well even under short time threshold. Finally; chapter 7 summarizes the thesis. Future vision of the work is also laid out; which is to implement it as a community-centric system.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tay, N. N. W. (2017). Human-centric Semantic Reasoning and Optimization for Smart Home : スマートホームのための人間中心セマンティック推論と最適化. (Thesis). Tokyo Metropolitan University / 首都大学東京. Retrieved from http://hdl.handle.net/10748/00009960

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tay, Noel Nuo Wi. “Human-centric Semantic Reasoning and Optimization for Smart Home : スマートホームのための人間中心セマンティック推論と最適化.” 2017. Thesis, Tokyo Metropolitan University / 首都大学東京. Accessed January 26, 2021. http://hdl.handle.net/10748/00009960.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tay, Noel Nuo Wi. “Human-centric Semantic Reasoning and Optimization for Smart Home : スマートホームのための人間中心セマンティック推論と最適化.” 2017. Web. 26 Jan 2021.

Vancouver:

Tay NNW. Human-centric Semantic Reasoning and Optimization for Smart Home : スマートホームのための人間中心セマンティック推論と最適化. [Internet] [Thesis]. Tokyo Metropolitan University / 首都大学東京; 2017. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10748/00009960.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tay NNW. Human-centric Semantic Reasoning and Optimization for Smart Home : スマートホームのための人間中心セマンティック推論と最適化. [Thesis]. Tokyo Metropolitan University / 首都大学東京; 2017. Available from: http://hdl.handle.net/10748/00009960

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

4. Churchill, Richard Lloyd. Modified Mclaren-marsaglia Pseudo-random Number Generator and Stochastic Key Agreement.

Degree: Computer Science Department, 2011, Oklahoma State University

 A discussion of problems in cryptographic applications, with a brief survey of pseudo-random number generators (PRNG) used as synchronous stream ciphers, leads to a discussion… (more)

Subjects/Keywords: odic; key agreement; pseudo-random

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Churchill, R. L. (2011). Modified Mclaren-marsaglia Pseudo-random Number Generator and Stochastic Key Agreement. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Churchill, Richard Lloyd. “Modified Mclaren-marsaglia Pseudo-random Number Generator and Stochastic Key Agreement.” 2011. Thesis, Oklahoma State University. Accessed January 26, 2021. http://hdl.handle.net/11244/8138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Churchill, Richard Lloyd. “Modified Mclaren-marsaglia Pseudo-random Number Generator and Stochastic Key Agreement.” 2011. Web. 26 Jan 2021.

Vancouver:

Churchill RL. Modified Mclaren-marsaglia Pseudo-random Number Generator and Stochastic Key Agreement. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/11244/8138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Churchill RL. Modified Mclaren-marsaglia Pseudo-random Number Generator and Stochastic Key Agreement. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

5. Reddy, Singi Reddy Rohith. Key Management and Encryption in Wireless Sensor Networks Using Hadamard Transforms.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis deals with key management in wireless sensor networks. The shortcomings of existing schemes include poor resilience against node capture, low secure connectivity and… (more)

Subjects/Keywords: blom scheme; encryption; hadamard transforms; key management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reddy, S. R. R. (2011). Key Management and Encryption in Wireless Sensor Networks Using Hadamard Transforms. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8245

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Reddy, Singi Reddy Rohith. “Key Management and Encryption in Wireless Sensor Networks Using Hadamard Transforms.” 2011. Thesis, Oklahoma State University. Accessed January 26, 2021. http://hdl.handle.net/11244/8245.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Reddy, Singi Reddy Rohith. “Key Management and Encryption in Wireless Sensor Networks Using Hadamard Transforms.” 2011. Web. 26 Jan 2021.

Vancouver:

Reddy SRR. Key Management and Encryption in Wireless Sensor Networks Using Hadamard Transforms. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/11244/8245.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Reddy SRR. Key Management and Encryption in Wireless Sensor Networks Using Hadamard Transforms. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8245

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

6. Zhang, Jie. Investigation on the Compress-and-Forward Relay Scheme.

Degree: 2012, University of Waterloo

 The relay channel plays an integral role in network communication systems. An intermediate node acts as a relay to facilitate the communication between the source… (more)

Subjects/Keywords: Relay Channel; Compress-and-Forward Scheme

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, J. (2012). Investigation on the Compress-and-Forward Relay Scheme. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/6495

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Jie. “Investigation on the Compress-and-Forward Relay Scheme.” 2012. Thesis, University of Waterloo. Accessed January 26, 2021. http://hdl.handle.net/10012/6495.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Jie. “Investigation on the Compress-and-Forward Relay Scheme.” 2012. Web. 26 Jan 2021.

Vancouver:

Zhang J. Investigation on the Compress-and-Forward Relay Scheme. [Internet] [Thesis]. University of Waterloo; 2012. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10012/6495.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang J. Investigation on the Compress-and-Forward Relay Scheme. [Thesis]. University of Waterloo; 2012. Available from: http://hdl.handle.net/10012/6495

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Indian Institute of Science

7. Tiwari, Mayank. Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement.

Degree: MSc Engg, Engineering, 2018, Indian Institute of Science

 Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key(more)

Subjects/Keywords: Hierarchical key Agreement; BIOS-SK Key; Random Oracle Model; Hash Function; ID-NIKA - Security Model; Non-Interactive Key Agreement; BIOS-SOK key agreement; Research Subject Categories::TECHNOLOGY

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tiwari, M. (2018). Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement. (Masters Thesis). Indian Institute of Science. Retrieved from http://etd.iisc.ac.in/handle/2005/4080

Chicago Manual of Style (16th Edition):

Tiwari, Mayank. “Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement.” 2018. Masters Thesis, Indian Institute of Science. Accessed January 26, 2021. http://etd.iisc.ac.in/handle/2005/4080.

MLA Handbook (7th Edition):

Tiwari, Mayank. “Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement.” 2018. Web. 26 Jan 2021.

Vancouver:

Tiwari M. Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement. [Internet] [Masters thesis]. Indian Institute of Science; 2018. [cited 2021 Jan 26]. Available from: http://etd.iisc.ac.in/handle/2005/4080.

Council of Science Editors:

Tiwari M. Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement. [Masters Thesis]. Indian Institute of Science; 2018. Available from: http://etd.iisc.ac.in/handle/2005/4080

8. Zibaeenejad, Ali. Key Agreement over Wiretap Models with Non-Causal Side Information.

Degree: 2012, University of Waterloo

 The security of information is an indispensable element of a communication system when transmitted signals are vulnerable to eavesdropping. This issue is a challenging problem… (more)

Subjects/Keywords: Channel with Random State; Gaussian Interference Channel; Key Capacity; Wiretap Channel; Key Agreement; Channel Coding; Information-Theoretic Security; Physical-Layer Security

…source-type model. . . . . . . . . . . . . . . . . . . . 20 1.8 Key agreement over a channel… …type model. . . . . . . . . . . . . . . . . . . 21 1.9 Key agreement over a channel-type… …wiretap channel. . . . . . . . . . . . . . . . . . . . . . . . . 14 1.6 Key agreement… …between Alice and Bob in presence of Eve. . . . . . . . . . 17 1.7 Key agreement over a… …with a double random binning strategy. . 82 4.1 Key agreement over the Gaussian model… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zibaeenejad, A. (2012). Key Agreement over Wiretap Models with Non-Causal Side Information. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/6805

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zibaeenejad, Ali. “Key Agreement over Wiretap Models with Non-Causal Side Information.” 2012. Thesis, University of Waterloo. Accessed January 26, 2021. http://hdl.handle.net/10012/6805.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zibaeenejad, Ali. “Key Agreement over Wiretap Models with Non-Causal Side Information.” 2012. Web. 26 Jan 2021.

Vancouver:

Zibaeenejad A. Key Agreement over Wiretap Models with Non-Causal Side Information. [Internet] [Thesis]. University of Waterloo; 2012. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10012/6805.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zibaeenejad A. Key Agreement over Wiretap Models with Non-Causal Side Information. [Thesis]. University of Waterloo; 2012. Available from: http://hdl.handle.net/10012/6805

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Chang, Hung-Ming. Decision-Making Factor of Channel Strategy of Medical Device.

Degree: Master, EMBA, 2011, NSYSU

 Since Taiwan implemented national health insurance, the advanced medical equipment companies began to enter the Taiwan market, driven by the rise of medical equipment industry.… (more)

Subjects/Keywords: medical equipment channel; key factors; channel pattern; channel decision-making; channel management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, H. (2011). Decision-Making Factor of Channel Strategy of Medical Device. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0824111-163308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Hung-Ming. “Decision-Making Factor of Channel Strategy of Medical Device.” 2011. Thesis, NSYSU. Accessed January 26, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0824111-163308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Hung-Ming. “Decision-Making Factor of Channel Strategy of Medical Device.” 2011. Web. 26 Jan 2021.

Vancouver:

Chang H. Decision-Making Factor of Channel Strategy of Medical Device. [Internet] [Thesis]. NSYSU; 2011. [cited 2021 Jan 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0824111-163308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang H. Decision-Making Factor of Channel Strategy of Medical Device. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0824111-163308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waikato

10. Majeed, Mohammed Kadhim. Evaluating the potential for a multi-use seasonal pumped storage scheme in New Zealand’s South Island .

Degree: 2019, University of Waikato

 A simulation evaluation is presented of the seasonal operation a possible 1,300 MW pumped storage scheme in New Zealand. The simulations are with respect to… (more)

Subjects/Keywords: Large seasonal pumped hydro energy storage; Onslow pumped storage scheme; Wanaka-Hawea pumped storage scheme; support further development wind energy; support development irrigation scheme; Simulation using matlab; water management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Majeed, M. K. (2019). Evaluating the potential for a multi-use seasonal pumped storage scheme in New Zealand’s South Island . (Doctoral Dissertation). University of Waikato. Retrieved from http://hdl.handle.net/10289/12423

Chicago Manual of Style (16th Edition):

Majeed, Mohammed Kadhim. “Evaluating the potential for a multi-use seasonal pumped storage scheme in New Zealand’s South Island .” 2019. Doctoral Dissertation, University of Waikato. Accessed January 26, 2021. http://hdl.handle.net/10289/12423.

MLA Handbook (7th Edition):

Majeed, Mohammed Kadhim. “Evaluating the potential for a multi-use seasonal pumped storage scheme in New Zealand’s South Island .” 2019. Web. 26 Jan 2021.

Vancouver:

Majeed MK. Evaluating the potential for a multi-use seasonal pumped storage scheme in New Zealand’s South Island . [Internet] [Doctoral dissertation]. University of Waikato; 2019. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10289/12423.

Council of Science Editors:

Majeed MK. Evaluating the potential for a multi-use seasonal pumped storage scheme in New Zealand’s South Island . [Doctoral Dissertation]. University of Waikato; 2019. Available from: http://hdl.handle.net/10289/12423


University of Georgia

11. Tang, Qianqian. Estimation of genomic copy frequency with correlated observations.

Degree: 2014, University of Georgia

 In this thesis, we compare several methods to handle correlated data related to genome frequency copies. First, we used standard Poisson Regression to analyze the… (more)

Subjects/Keywords: Poisson Regression; Over-dispersion; Under-dispersion; Dependent Weighting Scheme

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tang, Q. (2014). Estimation of genomic copy frequency with correlated observations. (Thesis). University of Georgia. Retrieved from http://hdl.handle.net/10724/28136

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tang, Qianqian. “Estimation of genomic copy frequency with correlated observations.” 2014. Thesis, University of Georgia. Accessed January 26, 2021. http://hdl.handle.net/10724/28136.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tang, Qianqian. “Estimation of genomic copy frequency with correlated observations.” 2014. Web. 26 Jan 2021.

Vancouver:

Tang Q. Estimation of genomic copy frequency with correlated observations. [Internet] [Thesis]. University of Georgia; 2014. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10724/28136.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tang Q. Estimation of genomic copy frequency with correlated observations. [Thesis]. University of Georgia; 2014. Available from: http://hdl.handle.net/10724/28136

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

12. Omondi, Tuju. The Influence of Unsecured Personal Loans on Inflation in Kenya .

Degree: 2012, University of Nairobi

 The objective of this research is to identify how unsecured personal loans influence the inflation rates in Kenya. This study provides a comprehensive assessment of… (more)

Subjects/Keywords: Unsecured Personal Loans

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Omondi, T. (2012). The Influence of Unsecured Personal Loans on Inflation in Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/97014

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Omondi, Tuju. “The Influence of Unsecured Personal Loans on Inflation in Kenya .” 2012. Thesis, University of Nairobi. Accessed January 26, 2021. http://hdl.handle.net/11295/97014.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Omondi, Tuju. “The Influence of Unsecured Personal Loans on Inflation in Kenya .” 2012. Web. 26 Jan 2021.

Vancouver:

Omondi T. The Influence of Unsecured Personal Loans on Inflation in Kenya . [Internet] [Thesis]. University of Nairobi; 2012. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/11295/97014.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Omondi T. The Influence of Unsecured Personal Loans on Inflation in Kenya . [Thesis]. University of Nairobi; 2012. Available from: http://hdl.handle.net/11295/97014

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Univerzitet u Beogradu

13. Pásztor, Bálint I. 1979-. Ограничења законодавне функције парламента у савременој држави.

Degree: Pravni fakultet, 2018, Univerzitet u Beogradu

Društvene nauke / Ustavno pravo Social sciences / constitutional law

Сматрамо да се основано може поставити питање: да ли је парламент још увек носилац законодавне… (more)

Subjects/Keywords: The following question can be raised: Are parliaments still the true bearers of the legislative power; or paraphrasing Hobbes: it is assumed who the legislator is; but is it also known? The subject of this thesis are the limits that parliaments are facing today while exercising their normative roles. These limitations are both internal and external; and may be traditional or of new origin. Today efficiency and speed are key expectations; it seems that parliaments as legislators are losing their breath and are facing many limitations in their role that has for centuries been their ”basic one”: their legislative role. The fact that the focus of power is increasingly shifting towards the executive branch of power even in countries with parliamentary systems of governance is not a novelty anymore. Parliaments; however; do not only face the limits placed before them by the governments throughout the legislative process. The key role of political parties; the relativization of the classical concept of sovereignty; and other limiting factors of the legislative role of parliaments; which need further examination; may lead to the modification of their functions in modern states. The aim of the dissertation is to through thoroughly selected scientific sources and relying on a decade-long experience as Member of the National Assembly of the Republic of Serbia precisely determine and rationally examine and draft an academic position about the role of parliaments today with regard to the limitations in their legislative function. We started off from the hypothesis that the legislative function of parliaments is set by the constitution; and narrowed by the ever increasing role of the governments in the legislative process; by political parties and other participants in the legislative procedure; as well as by the relativization of national sovereignty in the framework of international integration and also by the impact of global economic flows.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pásztor, B. I. 1. (2018). Ограничења законодавне функције парламента у савременој држави. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:18936/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pásztor, Bálint I 1979-. “Ограничења законодавне функције парламента у савременој држави.” 2018. Thesis, Univerzitet u Beogradu. Accessed January 26, 2021. https://fedorabg.bg.ac.rs/fedora/get/o:18936/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pásztor, Bálint I 1979-. “Ограничења законодавне функције парламента у савременој држави.” 2018. Web. 26 Jan 2021.

Vancouver:

Pásztor BI1. Ограничења законодавне функције парламента у савременој држави. [Internet] [Thesis]. Univerzitet u Beogradu; 2018. [cited 2021 Jan 26]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18936/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pásztor BI1. Ограничења законодавне функције парламента у савременој држави. [Thesis]. Univerzitet u Beogradu; 2018. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18936/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Boise State University

14. Sridhar, Srisarguru. A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption.

Degree: 2016, Boise State University

Over the years, email has evolved and grown to one of the most widely used form of communication between individuals and organizations. Nonetheless, the current… (more)

Subjects/Keywords: P2P email encryption; group key agreement; one-way key agreement; certificateless PKC; identity-based PKC; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sridhar, S. (2016). A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption. (Thesis). Boise State University. Retrieved from https://scholarworks.boisestate.edu/td/1231

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sridhar, Srisarguru. “A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption.” 2016. Thesis, Boise State University. Accessed January 26, 2021. https://scholarworks.boisestate.edu/td/1231.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sridhar, Srisarguru. “A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption.” 2016. Web. 26 Jan 2021.

Vancouver:

Sridhar S. A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption. [Internet] [Thesis]. Boise State University; 2016. [cited 2021 Jan 26]. Available from: https://scholarworks.boisestate.edu/td/1231.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sridhar S. A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption. [Thesis]. Boise State University; 2016. Available from: https://scholarworks.boisestate.edu/td/1231

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Rufino, Vilc Queupe. Acordo de chaves criptográficas hierárquico e sem certificado.

Degree: Mestrado, Ciência da Computação, 2009, University of São Paulo

Apresentamos um novo esquema de acordo de chaves criptográficas hierárquico, não Interativo e seguro contra comprometimento de múltiplos nós. Esquemas para Acordo de chaves criptográficas… (more)

Subjects/Keywords: certificateless; chave pública; criptografia; criptography; hierarchy; hierarquia; key agreement; public key; security; segurança; sem certificado

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rufino, V. Q. (2009). Acordo de chaves criptográficas hierárquico e sem certificado. (Masters Thesis). University of São Paulo. Retrieved from http://www.teses.usp.br/teses/disponiveis/45/45134/tde-19122009-213045/ ;

Chicago Manual of Style (16th Edition):

Rufino, Vilc Queupe. “Acordo de chaves criptográficas hierárquico e sem certificado.” 2009. Masters Thesis, University of São Paulo. Accessed January 26, 2021. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-19122009-213045/ ;.

MLA Handbook (7th Edition):

Rufino, Vilc Queupe. “Acordo de chaves criptográficas hierárquico e sem certificado.” 2009. Web. 26 Jan 2021.

Vancouver:

Rufino VQ. Acordo de chaves criptográficas hierárquico e sem certificado. [Internet] [Masters thesis]. University of São Paulo; 2009. [cited 2021 Jan 26]. Available from: http://www.teses.usp.br/teses/disponiveis/45/45134/tde-19122009-213045/ ;.

Council of Science Editors:

Rufino VQ. Acordo de chaves criptográficas hierárquico e sem certificado. [Masters Thesis]. University of São Paulo; 2009. Available from: http://www.teses.usp.br/teses/disponiveis/45/45134/tde-19122009-213045/ ;


Brno University of Technology

16. Bartošová, Klára. REVITALIZACE PŘEDPOLÍ KVĚTNÉ ZAHRADY V KROMĚŘÍŽI: Revitalization Program of Floral Garden in Kromeriz.

Degree: 2018, Brno University of Technology

 The flower garden was designed in a spirit of a rennaisance vision of the world (an attitude to the universe, the nature and a human… (more)

Subjects/Keywords: Conserving a dominant factor of the garden and an entering part of the Court of honour. Let a visitor of the garden to enter the area / composition through the same entrance as was the original one. Creation of a new scheme of the front garden which won´t compete with garden – it is considered to be a neutral counterpart. A brand new stage of the front garden will represent a synthesis of its preceding stages. It will represent a brand new vision of the original designer´s intension.; Conserving a dominant factor of the garden and an entering part of the Court of honour. Let a visitor of the garden to enter the area / composition through the same entrance as was the original one. Creation of a new scheme of the front garden which won´t compete with garden – it is considered to be a neutral counterpart. A brand new stage of the front garden will represent a synthesis of its preceding stages. It will represent a brand new vision of the original designer´s intension.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bartošová, K. (2018). REVITALIZACE PŘEDPOLÍ KVĚTNÉ ZAHRADY V KROMĚŘÍŽI: Revitalization Program of Floral Garden in Kromeriz. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/21070

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bartošová, Klára. “REVITALIZACE PŘEDPOLÍ KVĚTNÉ ZAHRADY V KROMĚŘÍŽI: Revitalization Program of Floral Garden in Kromeriz.” 2018. Thesis, Brno University of Technology. Accessed January 26, 2021. http://hdl.handle.net/11012/21070.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bartošová, Klára. “REVITALIZACE PŘEDPOLÍ KVĚTNÉ ZAHRADY V KROMĚŘÍŽI: Revitalization Program of Floral Garden in Kromeriz.” 2018. Web. 26 Jan 2021.

Vancouver:

Bartošová K. REVITALIZACE PŘEDPOLÍ KVĚTNÉ ZAHRADY V KROMĚŘÍŽI: Revitalization Program of Floral Garden in Kromeriz. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/11012/21070.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bartošová K. REVITALIZACE PŘEDPOLÍ KVĚTNÉ ZAHRADY V KROMĚŘÍŽI: Revitalization Program of Floral Garden in Kromeriz. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/21070

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Novak, Ivan. Vizualizacija vodenja hidravličnega cilindra.

Degree: 2019, Univerza v Mariboru

V okviru magistrske naloge je izdelan hidravlični sistem s položajnim in avtomatičnim vodenjem pomika batnice vertikalnega hidravličnega valja z aktivnim nastavljanjem hitrosti. Vodenje je izvedeno… (more)

Subjects/Keywords: vertikalni hidravlični valj; krmilnik; vizualizacija; inkrementalni dajalnik; elektrohidravlični proporcionalni potni ventil; mobilna aplikacija; PLK.; In the context of the master thesis; a hydraulic system is constructed with position and automatic control of the displacement of the vertical hydraulic cylinder piston with an active speed setting. Management is carried out using a computer with an appropriate programming interface and industrial controller. The visualization is designed to visualise the entire process which enables its full control. In addition to the hydraulic cylinder and computer; the key components in the system performance represent the Electrohydraulic proportional travel valve and the incremental encoder. In a meaningful sequence; it shows the design and implementation of the entire system; which contains plans for electrical connection of devices with the Siemens S7-1200 industrial controller. The entire system has added a contactless mode of management with the "S7 PLC HMI" mobile application; which uses a Wi-Fi router to communicate between the mobile phone and the controller. The controller's programming p; info:eu-repo/classification/udc/681.523.4:007.52(043.2)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Novak, I. (2019). Vizualizacija vodenja hidravličnega cilindra. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=74053 ; https://dk.um.si/Dokument.php?id=138702&dn= ; https://plus.si.cobiss.net/opac7/bib/23037974?lang=sl

Chicago Manual of Style (16th Edition):

Novak, Ivan. “Vizualizacija vodenja hidravličnega cilindra.” 2019. Masters Thesis, Univerza v Mariboru. Accessed January 26, 2021. https://dk.um.si/IzpisGradiva.php?id=74053 ; https://dk.um.si/Dokument.php?id=138702&dn= ; https://plus.si.cobiss.net/opac7/bib/23037974?lang=sl.

MLA Handbook (7th Edition):

Novak, Ivan. “Vizualizacija vodenja hidravličnega cilindra.” 2019. Web. 26 Jan 2021.

Vancouver:

Novak I. Vizualizacija vodenja hidravličnega cilindra. [Internet] [Masters thesis]. Univerza v Mariboru; 2019. [cited 2021 Jan 26]. Available from: https://dk.um.si/IzpisGradiva.php?id=74053 ; https://dk.um.si/Dokument.php?id=138702&dn= ; https://plus.si.cobiss.net/opac7/bib/23037974?lang=sl.

Council of Science Editors:

Novak I. Vizualizacija vodenja hidravličnega cilindra. [Masters Thesis]. Univerza v Mariboru; 2019. Available from: https://dk.um.si/IzpisGradiva.php?id=74053 ; https://dk.um.si/Dokument.php?id=138702&dn= ; https://plus.si.cobiss.net/opac7/bib/23037974?lang=sl


University of Waterloo

18. Swanson, Colleen Marie. Security in Key Agreement: Two-Party Certificateless Schemes.

Degree: 2008, University of Waterloo

 The main goal of cryptography is to enable secure communication over a public channel; often a secret shared among the communicating parties is used to… (more)

Subjects/Keywords: key agreement; certificateless; key establishment; key compromise impersonation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Swanson, C. M. (2008). Security in Key Agreement: Two-Party Certificateless Schemes. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/4156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Swanson, Colleen Marie. “Security in Key Agreement: Two-Party Certificateless Schemes.” 2008. Thesis, University of Waterloo. Accessed January 26, 2021. http://hdl.handle.net/10012/4156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Swanson, Colleen Marie. “Security in Key Agreement: Two-Party Certificateless Schemes.” 2008. Web. 26 Jan 2021.

Vancouver:

Swanson CM. Security in Key Agreement: Two-Party Certificateless Schemes. [Internet] [Thesis]. University of Waterloo; 2008. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10012/4156.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Swanson CM. Security in Key Agreement: Two-Party Certificateless Schemes. [Thesis]. University of Waterloo; 2008. Available from: http://hdl.handle.net/10012/4156

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

19. Fan, Kai-hsun. The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Studies were conducted on vehicular ad-hoc network (VANET) in recent years. VANET is a network that combines on-board wireless equipment and roadside fixed wireless equipment… (more)

Subjects/Keywords: Message Authentication; VANETs; Elliptic Curve Cryptosystem; Key Agreement; Chameleon Hashing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fan, K. (2014). The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0020114-171247

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fan, Kai-hsun. “The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device.” 2014. Thesis, NSYSU. Accessed January 26, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0020114-171247.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fan, Kai-hsun. “The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device.” 2014. Web. 26 Jan 2021.

Vancouver:

Fan K. The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 Jan 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0020114-171247.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fan K. The Authentication Scheme Based on Chameleon Hashing for Vehicular Ad-Hoc Networks without RSU Device. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0020114-171247

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

20. Luo, Zhong-Ting. Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In recent year, Vehicular Ad Hoc Networks has many research to explore, VANET is a mobile communication technology, and the major utilize of the moving… (more)

Subjects/Keywords: Key Agreement; Chameleon Hashing; Revocation; VANETs; Anonymous Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, Z. (2014). Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-150131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Luo, Zhong-Ting. “Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks.” 2014. Thesis, NSYSU. Accessed January 26, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-150131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Luo, Zhong-Ting. “Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks.” 2014. Web. 26 Jan 2021.

Vancouver:

Luo Z. Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 Jan 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-150131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Luo Z. Chameleon Hashing Based Message Authentication, Private Communication and Revocation in Vehicular Ad Hoc Networks. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-150131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Liu, Jian-You. An Anonymous Authentication and Key Agreement Scheme in VANETs.

Degree: Master, Computer Science and Engineering, 2012, NSYSU

 Vehicular ad-hoc network (VANETs) has been a hot research topic in recent years. In this environment, each vehicle can broadcast messages to other vehicles and… (more)

Subjects/Keywords: VANETs; Anonymous Authentication; ID-based Cryptography; Key Agreement; Chameleon hashing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, J. (2012). An Anonymous Authentication and Key Agreement Scheme in VANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723112-111418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Jian-You. “An Anonymous Authentication and Key Agreement Scheme in VANETs.” 2012. Thesis, NSYSU. Accessed January 26, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723112-111418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Jian-You. “An Anonymous Authentication and Key Agreement Scheme in VANETs.” 2012. Web. 26 Jan 2021.

Vancouver:

Liu J. An Anonymous Authentication and Key Agreement Scheme in VANETs. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 Jan 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723112-111418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu J. An Anonymous Authentication and Key Agreement Scheme in VANETs. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723112-111418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

22. Kuo, Pin-Chun. Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In recent years, more and more people have invested a lot of effort in Vehicular Ad Hoc Networks (VANETs) to study and discuss. VANETs is… (more)

Subjects/Keywords: Key Agreement; Intra / Inter Pairing; Anonymous Authentication; Chameleon Hashing; VANETs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, P. (2015). Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-093000

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Pin-Chun. “Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment.” 2015. Thesis, NSYSU. Accessed January 26, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-093000.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Pin-Chun. “Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment.” 2015. Web. 26 Jan 2021.

Vancouver:

Kuo P. Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment. [Internet] [Thesis]. NSYSU; 2015. [cited 2021 Jan 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-093000.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo P. Chameleon Hash Based Message Authentication for VANETs in Sparse RSU Environment. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-093000

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Snoap, John A. Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes.

Degree: MS, Electrical/Computer Engineering, 2016, Old Dominion University

  Physical layer approaches for generating secret encryption keys for wireless systems using channel information have attracted increased interest from researchers in recent years. This… (more)

Subjects/Keywords: Agreement; Key; Layer; Physical; Secret; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Snoap, J. A. (2016). Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes. (Thesis). Old Dominion University. Retrieved from 9781369555684 ; https://digitalcommons.odu.edu/ece_etds/13

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Snoap, John A. “Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes.” 2016. Thesis, Old Dominion University. Accessed January 26, 2021. 9781369555684 ; https://digitalcommons.odu.edu/ece_etds/13.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Snoap, John A. “Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes.” 2016. Web. 26 Jan 2021.

Vancouver:

Snoap JA. Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes. [Internet] [Thesis]. Old Dominion University; 2016. [cited 2021 Jan 26]. Available from: 9781369555684 ; https://digitalcommons.odu.edu/ece_etds/13.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Snoap JA. Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes. [Thesis]. Old Dominion University; 2016. Available from: 9781369555684 ; https://digitalcommons.odu.edu/ece_etds/13

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Al-Hassan, Salah Yousif Radhi. Asymmetric encryption for wiretap channels.

Degree: PhD, 2015, University of Plymouth

 Since the definition of the wiretap channel by Wyner in 1975, there has been much research to investigate the communication security of this channel. This… (more)

Subjects/Keywords: 621.389; Wiretap Channel; Syndrome Coding Scheme; Best Known Equivocation Codes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hassan, S. Y. R. (2015). Asymmetric encryption for wiretap channels. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3765

Chicago Manual of Style (16th Edition):

Al-Hassan, Salah Yousif Radhi. “Asymmetric encryption for wiretap channels.” 2015. Doctoral Dissertation, University of Plymouth. Accessed January 26, 2021. http://hdl.handle.net/10026.1/3765.

MLA Handbook (7th Edition):

Al-Hassan, Salah Yousif Radhi. “Asymmetric encryption for wiretap channels.” 2015. Web. 26 Jan 2021.

Vancouver:

Al-Hassan SYR. Asymmetric encryption for wiretap channels. [Internet] [Doctoral dissertation]. University of Plymouth; 2015. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10026.1/3765.

Council of Science Editors:

Al-Hassan SYR. Asymmetric encryption for wiretap channels. [Doctoral Dissertation]. University of Plymouth; 2015. Available from: http://hdl.handle.net/10026.1/3765


Missouri University of Science and Technology

25. Zawodniok, Maciej Jan. Distributed power control (DPC) based energy efficient protocols for wireless networks.

Degree: PhD, Computer Engineering, Missouri University of Science and Technology

 "Energy efficiency is an important issue for wireless networks since it extends the lifetime of a wireless network and improves quality of service (QoS). Therefore,… (more)

Subjects/Keywords: Channel prediction scheme; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zawodniok, M. J. (n.d.). Distributed power control (DPC) based energy efficient protocols for wireless networks. (Doctoral Dissertation). Missouri University of Science and Technology. Retrieved from https://scholarsmine.mst.edu/doctoral_dissertations/1753

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Chicago Manual of Style (16th Edition):

Zawodniok, Maciej Jan. “Distributed power control (DPC) based energy efficient protocols for wireless networks.” Doctoral Dissertation, Missouri University of Science and Technology. Accessed January 26, 2021. https://scholarsmine.mst.edu/doctoral_dissertations/1753.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

MLA Handbook (7th Edition):

Zawodniok, Maciej Jan. “Distributed power control (DPC) based energy efficient protocols for wireless networks.” Web. 26 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Zawodniok MJ. Distributed power control (DPC) based energy efficient protocols for wireless networks. [Internet] [Doctoral dissertation]. Missouri University of Science and Technology; [cited 2021 Jan 26]. Available from: https://scholarsmine.mst.edu/doctoral_dissertations/1753.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Council of Science Editors:

Zawodniok MJ. Distributed power control (DPC) based energy efficient protocols for wireless networks. [Doctoral Dissertation]. Missouri University of Science and Technology; Available from: https://scholarsmine.mst.edu/doctoral_dissertations/1753

Note: this citation may be lacking information needed for this citation format:
No year of publication.


King Abdullah University of Science and Technology

26. Briantceva, Nadezhda. Fundamental Molecular Communication Modelling.

Degree: 2020, King Abdullah University of Science and Technology

 As traditional communication technology we use in our day-to-day life reaches its limitations, the international community searches for new methods to communicate information. One such… (more)

Subjects/Keywords: Molecular communication; Finite difference scheme; Discontinuous Galerkin; Channel modelling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Briantceva, N. (2020). Fundamental Molecular Communication Modelling. (Thesis). King Abdullah University of Science and Technology. Retrieved from http://hdl.handle.net/10754/664850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Briantceva, Nadezhda. “Fundamental Molecular Communication Modelling.” 2020. Thesis, King Abdullah University of Science and Technology. Accessed January 26, 2021. http://hdl.handle.net/10754/664850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Briantceva, Nadezhda. “Fundamental Molecular Communication Modelling.” 2020. Web. 26 Jan 2021.

Vancouver:

Briantceva N. Fundamental Molecular Communication Modelling. [Internet] [Thesis]. King Abdullah University of Science and Technology; 2020. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10754/664850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Briantceva N. Fundamental Molecular Communication Modelling. [Thesis]. King Abdullah University of Science and Technology; 2020. Available from: http://hdl.handle.net/10754/664850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

27. Gamieldien, Mogamad Faaik. An annotated translation of the manuscript Irshad Al-MuqallidinʾInda Ikhtilaf Al-Mujtahidin (Advice to the laity when the juristconsults differ) by Abu Muhammad Al-Shaykh Sidiya Baba Ibn Al-Shaykh Al-Shinqiti Al-Itisha- I (D. 1921/1342) and a synopsis and commentary of its dominant themes .

Degree: 2018, University of South Africa

 In pre-colonial Africa, the Southwestern Sahara which includes Mauritania, Mali and Senegal belonged to what was then referred to as the Sudan and extended from… (more)

Subjects/Keywords: Uṣūl al-Fiqh (Islamic Jurisprudence or Legal Theory); Sharī ͑ah (the collective name for Islam’s religious, liturgical, ethical, and jurisprudential systems); Ḥadīth (Sayings of the Prophet); Ikhtilāf (juristic divergence); Taqlīd (following a specific school of legal thought); Ijtihād (the exercise of a creative but disciplined application of scholarship and legal acumen upon the juridical sources in order to derive legal rulings therefrom); Tarjīh (The rule of preferring one proof text over another.); Muqallid (a follower of an independent jurist); Mujtahid (a juristconsult); Madhhab (an orthodox school of Islamic law); Naskh (abrogation); Qiyās (analogical reasoning); Ijmāʿ (consensus); Mutashābihāt (The mutashābihāt are equivocal words or statements in the Qur ʾān which are ambiguous and therefore lends itself to scholarly dispute. It is the opposite of muḥkamāt which are clear unequivocal statements and words of the Qur ʾān.); Muḥkamāt (Verses that are entirely clear and unambiguous relating toaḥkām (commandments etc.), al-Farā-id (obligatory duties) and al- Ḥudūd (criminal law relating to punishments).

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gamieldien, M. F. (2018). An annotated translation of the manuscript Irshad Al-MuqallidinʾInda Ikhtilaf Al-Mujtahidin (Advice to the laity when the juristconsults differ) by Abu Muhammad Al-Shaykh Sidiya Baba Ibn Al-Shaykh Al-Shinqiti Al-Itisha- I (D. 1921/1342) and a synopsis and commentary of its dominant themes . (Doctoral Dissertation). University of South Africa. Retrieved from http://hdl.handle.net/10500/25753

Chicago Manual of Style (16th Edition):

Gamieldien, Mogamad Faaik. “An annotated translation of the manuscript Irshad Al-MuqallidinʾInda Ikhtilaf Al-Mujtahidin (Advice to the laity when the juristconsults differ) by Abu Muhammad Al-Shaykh Sidiya Baba Ibn Al-Shaykh Al-Shinqiti Al-Itisha- I (D. 1921/1342) and a synopsis and commentary of its dominant themes .” 2018. Doctoral Dissertation, University of South Africa. Accessed January 26, 2021. http://hdl.handle.net/10500/25753.

MLA Handbook (7th Edition):

Gamieldien, Mogamad Faaik. “An annotated translation of the manuscript Irshad Al-MuqallidinʾInda Ikhtilaf Al-Mujtahidin (Advice to the laity when the juristconsults differ) by Abu Muhammad Al-Shaykh Sidiya Baba Ibn Al-Shaykh Al-Shinqiti Al-Itisha- I (D. 1921/1342) and a synopsis and commentary of its dominant themes .” 2018. Web. 26 Jan 2021.

Vancouver:

Gamieldien MF. An annotated translation of the manuscript Irshad Al-MuqallidinʾInda Ikhtilaf Al-Mujtahidin (Advice to the laity when the juristconsults differ) by Abu Muhammad Al-Shaykh Sidiya Baba Ibn Al-Shaykh Al-Shinqiti Al-Itisha- I (D. 1921/1342) and a synopsis and commentary of its dominant themes . [Internet] [Doctoral dissertation]. University of South Africa; 2018. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/10500/25753.

Council of Science Editors:

Gamieldien MF. An annotated translation of the manuscript Irshad Al-MuqallidinʾInda Ikhtilaf Al-Mujtahidin (Advice to the laity when the juristconsults differ) by Abu Muhammad Al-Shaykh Sidiya Baba Ibn Al-Shaykh Al-Shinqiti Al-Itisha- I (D. 1921/1342) and a synopsis and commentary of its dominant themes . [Doctoral Dissertation]. University of South Africa; 2018. Available from: http://hdl.handle.net/10500/25753


NSYSU

28. Wang , Yan-ju. The pragmatic act of soliciting an agreement in two Chinese love matching shows.

Degree: Master, Foreign Language and Literature, 2017, NSYSU

 Previous studies of what one can do with words have focused on the speech acts and their performative verbs. However, most speech acts are implicit… (more)

Subjects/Keywords: situated speech acts; society; gender; soliciting an agreement; projective acts of identity; pragmatic act

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang , Y. (2017). The pragmatic act of soliciting an agreement in two Chinese love matching shows. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0014117-215644

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang , Yan-ju. “The pragmatic act of soliciting an agreement in two Chinese love matching shows.” 2017. Thesis, NSYSU. Accessed January 26, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0014117-215644.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang , Yan-ju. “The pragmatic act of soliciting an agreement in two Chinese love matching shows.” 2017. Web. 26 Jan 2021.

Vancouver:

Wang Y. The pragmatic act of soliciting an agreement in two Chinese love matching shows. [Internet] [Thesis]. NSYSU; 2017. [cited 2021 Jan 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0014117-215644.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Y. The pragmatic act of soliciting an agreement in two Chinese love matching shows. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0014117-215644

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

29. Alawatugoda, Janaka Araliya Bandara. On the leakage resilience of secure channel establishment.

Degree: 2015, Queensland University of Technology

 Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a… (more)

Subjects/Keywords: Leakage-resilient; Side-channel attacks; Authenticated key exchange; Secure channel; Public-key cryptography; Data compression; CRIME; BREACH

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alawatugoda, J. A. B. (2015). On the leakage resilience of secure channel establishment. (Thesis). Queensland University of Technology. Retrieved from http://eprints.qut.edu.au/90920/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alawatugoda, Janaka Araliya Bandara. “On the leakage resilience of secure channel establishment.” 2015. Thesis, Queensland University of Technology. Accessed January 26, 2021. http://eprints.qut.edu.au/90920/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alawatugoda, Janaka Araliya Bandara. “On the leakage resilience of secure channel establishment.” 2015. Web. 26 Jan 2021.

Vancouver:

Alawatugoda JAB. On the leakage resilience of secure channel establishment. [Internet] [Thesis]. Queensland University of Technology; 2015. [cited 2021 Jan 26]. Available from: http://eprints.qut.edu.au/90920/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alawatugoda JAB. On the leakage resilience of secure channel establishment. [Thesis]. Queensland University of Technology; 2015. Available from: http://eprints.qut.edu.au/90920/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

30. Bloch, Matthieu. Physical-layer security.

Degree: PhD, Electrical and Computer Engineering, 2008, Georgia Tech

 As wireless networks continue to flourish worldwide and play an increasingly prominent role, it has become crucial to provide effective solutions to the inherent security… (more)

Subjects/Keywords: Wiretap channel; Information-theoretic security; Physical-layer security; Secret-key agreement; LDPC codes; Wireless communication systems; Computer networks Security measures

channel model . . . . . . . . . . . . . . . 15 Secret key agreement from common randomness… …key agreement based on low-density parity-check codes, which is specifically designed to… …identify a codeword sent over the channel provided that she knows the bin to which the codeword… …2.4 Secret key agreement from common randomness Contrary to the wiretap channel problem… …17 2.4.1 Three-terminal secret key agreement . . . . . . . . . . . . . . . . . 17 2.4.2… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bloch, M. (2008). Physical-layer security. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/24658

Chicago Manual of Style (16th Edition):

Bloch, Matthieu. “Physical-layer security.” 2008. Doctoral Dissertation, Georgia Tech. Accessed January 26, 2021. http://hdl.handle.net/1853/24658.

MLA Handbook (7th Edition):

Bloch, Matthieu. “Physical-layer security.” 2008. Web. 26 Jan 2021.

Vancouver:

Bloch M. Physical-layer security. [Internet] [Doctoral dissertation]. Georgia Tech; 2008. [cited 2021 Jan 26]. Available from: http://hdl.handle.net/1853/24658.

Council of Science Editors:

Bloch M. Physical-layer security. [Doctoral Dissertation]. Georgia Tech; 2008. Available from: http://hdl.handle.net/1853/24658

[1] [2] [3] [4] [5] … [493]

.