Lakehead University Library Logo
    • Login
    Browsing by Subject 
    •   Knowledge Commons
    • Browsing by Subject
    •   Knowledge Commons
    • Browsing by Subject
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    quick search

    Browse

    All of Knowledge CommonsCommunities & CollectionsBy Issue DateAuthorTitleSubjectDisciplineAdvisorCommittee Member

    My Account

    Login

    Browsing by Subject "Data encryption (Computer science)"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-5 of 5

    • title
    • issue date
    • submit date
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.author
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        A new fingerprint design using optical orthogonal codes 

        Zhao, Na (2014)
        Digital fingerprinting has been proposed to restrict illegal distribution of digital media, where every piece of media has a unique fingerprint as an identifying feature that can be traceable. However, fingerprint systems ...
      • Thumbnail

        Access control scheme for partially ordered set hierarchy with provable security 

        Wu, Jiang (2005)
        In many multi-user information systems, the users are organized as a hierarchy. Each user is a subordinate, superior and/or coordinate of some others. In such systems, a user has access to the information if and only if ...
      • Thumbnail

        Indirect key derivation schemes for key management of access hierarchies 

        Cacic, Brian John (2004)
        In this thesis, we study the problem of key management within an access hierarchy. Our contribution to the key management problem is an indirect key derivation approach we call the HMAC-method. It is called the HMAC-method, ...
      • Thumbnail

        Observer-based chaos synchronization for secure communications 

        Sun, Shuwen (2006)
        Chaos, with reference to chaos theory, refers to an apparent lack of order in a system that, nevertheless, obeys particular laws or rules. The chaotic signals generated by chaotic systems have some properties such as ...
      • Thumbnail

        Secret sharing for mobile agent cryptography 

        Miao, Chung (2003)
        A mobile agent is a multi-threaded autonomous program that can be distributed over a heterogeneous network to perform some predefined task for its hum an creator (user). The independence, flexibility and autonomy offered ...

        Lakehead University Library
        Contact Us | Send Feedback

         


        Lakehead University Library
        Contact Us | Send Feedback