Follow

Theses/Dissertations from 2019

PDF

Intrusion-tolerant Order-preserving Encryption, John Huson

Theses/Dissertations from 2018

PDF

Security attacks on RECKLESS-APPs: "Remote car keyless applications" for new semi autonomous vehicles, Mohamed El-Tawab

Theses/Dissertations from 2016

PDF

Improving the security of wireless sensor networks, Mauricio Tellez Nava

Theses/Dissertations from 2015

PDF

Analysis of real-world passwords for social media sites, Mark J. Quinn

Theses/Dissertations from 2014

PDF

Automated snort signature generation, Brandon Rice

Theses/Dissertations from 2013

PDF

Electronic voting: Methods and protocols, Christopher Andrew Collord

PDF

Class control: An adaptable and self configuring classroom control system, Thomas Grimes

PDF

Data carving parser generation, Benjamin Nathaniel Kelley

PDF

Fingerprint fuzzy vault: Security analysis and a new scheme, Patrick J.B. Perry

Theses/Dissertations from 2012

PDF

Forensic analysis of linux physical memory: Extraction and resumption of running processes., Ernest D. Mougoue

PDF

Identity management in a public IaaS Cloud, William T. Skinner III

PDF

Methodology and automated metadata extraction from multiple volume shadow copies, Henri Michael van Goethem

Theses/Dissertations from 2011

PDF

Impediment sensitive-role based access control, Joseph Frederick Blumberg

Theses/Dissertations from 2010

PDF

Security analysis of a fingerprint-secured USB drive, Benjamin David Rodes

PDF

Improving the measurement of system time on remote hosts, Michael Christopher Smith