1. Doctoral Thesis › Research
  2. Unpublished

    Challenging Environments: Using Mobile Devices for Security

    Cobourne, S., 2018, (Unpublished) 230 p.

    Research output: ThesisDoctoral Thesis

  3. Unpublished

    Cold Boot Attacks on Post-Quantum Schemes

    Villanueva Polanco, R., 8 Mar 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  4. Unpublished

    Combinatorial Aspects of Key Predistribution for Resource-Constrained Networks

    Kendall, M., 2013, (Unpublished) 194 p.

    Research output: ThesisDoctoral Thesis

  5. Unpublished

    Completeness in Languages for Attribute-Based Access Control

    Williams, C., 2018, (Unpublished) 141 p.

    Research output: ThesisDoctoral Thesis

  6. Unpublished

    Computing Functions Securely: Theory, Implementation and Cryptanalysis

    Davidson, A., 2019, (Unpublished) 383 p.

    Research output: ThesisDoctoral Thesis

  7. Unpublished

    Context Based Anomaly Detection in Critical Infrastructures

    Mcevoy, T. R., 2013, (Unpublished) 224 p.

    Research output: ThesisDoctoral Thesis

  8. Unpublished

    Cryptanalysis and Applications of Lattice-based Encryption Schemes

    Curtis, B., 2020, (Unpublished) 220 p.

    Research output: ThesisDoctoral Thesis

  9. Unpublished

    Cryptanalysis of Some Block Ciphers

    Haji Naim, A. G., 2016, (Unpublished) 374 p.

    Research output: ThesisDoctoral Thesis

  10. Unpublished

    Cryptographic Approaches To Security and Privacy Issues In Pervasive Computing

    Cho, J., 2013, (Unpublished) 171 p.

    Research output: ThesisDoctoral Thesis

  11. Unpublished

    Cryptographic Security of SSH Encryption Schemes

    Hansen, T., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

Previous 1...7 8 9 10 11 12 13 14 ...214 Next