Дисертації з теми "Information security fields"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-19 дисертацій для дослідження на тему "Information security fields".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Kahrs, Katharina. "Share Computing Protocols over Fields and Rings." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9001.
Повний текст джерелаIn this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold linear secret sharing schemes, over fields and rings in a compact and concise way. We explain two characterisations of linear secret sharing schemes, and in particular, we characterise threshold linear secret sharing schemes. We develop an algorithm to generate all multiplicative $(t+1)$-out-of-$n$ threshold linear secret sharing schemes over a field $mathbb{Z}sb{p}$. For the ring $mathbb{Z}sb{2sp{32}}$, we explain the generation of secret sharing schemes for threshold access structures and prove the non-existence of $(t+1)$-out-of-$n$ threshold linear secret sharing schemes with $n > t+1$.
Gutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.
Повний текст джерелаNote: Updated version of the thesis now published as Gutmann, P (2004). Cryptographic security architecture: design and verification. New York: Springer. ISBN 9780387953876.
Zhang, Yang. "An empirical study on the relationship between identity-checking steps and perceived trustworthiness in online banking system use : submitted in partial fulfilment of the requirements for the Degree of Master of Information Sciences in Information Technology." Massey University, 2009. http://hdl.handle.net/10179/982.
Повний текст джерелаSteele, Aaron. "Ontological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/946.
Повний текст джерелаXiao, Jiaxi. "Information theoretic approach in detection and security codes." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43620.
Повний текст джерелаPourghomi, Pardis. "Managing near field communication (NFC) payment applications through cloud computing." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8538.
Повний текст джерелаBlommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.
Повний текст джерелаVerification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.
Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.
In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.
The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.
Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.
Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.
Nordström, Daniel, and David Nyqvist. "Near Field Communication : En studie av säkerhetsaspekternas påverkan för mobila betalningar." Thesis, Uppsala universitet, Institutionen för informatik och media, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-179609.
Повний текст джерелаNear Field Communication (NFC) is a technology that enables the development of payments using the mobile phone. In Sweden, payments with NFC technology in mobile phones are still in the introductory phase. To ensure that the proposed technology can be utilized as a complement to existing payment options, one must consider the safety aspects of said construct. In this thesis we will review the technology with a focus on safety aspects. The purpose of this thesis is to review the security aspects of NFC technology for mobile payment and analyze these aspects in order to gain deeper knowledge of NFC technology opportunities. The knowledge has been obtained through a literature review, complemented by an interview to get a wide knowledge about the information. The results of the study show that NFC technology as a payment option can be affected by a number of safety issues. To ensure a viable market share, operators utilizing NFC technology must cooperate to standardize the implementation.
Швець, Валеріян Анатолійович, та Тетяна Вікторівна Мелешко. "Напрями забезпечення доступності і цілісності інформації глобальних навігаційних супутникових систем". Thesis, RS Global Sp. z O.O. Warsaw, Poland, 2020. http://er.nau.edu.ua/handle/NAU/41256.
Повний текст джерелаHassanzadeh, Reza. "A secure framework and related protocols for ubiquitous access to electronic health records using Java sim cards." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37589/1/Reza_Hassanzadeh_Thesis.pdf.
Повний текст джерелаRoberts, Anthea Elizabeth. "Is International Law International?" Phd thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/124611.
Повний текст джерелаFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Повний текст джерелаMajumdar, Anirban. "Design and evaluation of software obfuscations." 2008. http://hdl.handle.net/2292/3107.
Повний текст джерелаWhole document restricted, but available by request, use the feedback form to request access.
Li, Shih-Wei, and 李世偉. "The Patent Map Analysis of Information Security to Near Field Communication." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/07067012311729693056.
Повний текст джерела國立高雄應用科技大學
模具系碩士在職專班
101
Near Field Communication Technique is a short-distance wireless technology, and achieves date intercommunication in a very short distance. NFC device replaces the current smartphone code-interception through photographic lens, and allows users to use NFC tag scanning to obtain regional information, internet connection, discount information, software and music downloading, etc. In some countries, in order to improve the life convenience, smartphone which built-in NFC device is used directly as an electronic wallet. This study investigated the NFC for future research and development direction of information security, and compared the patent systems between Taiwan and other countries in the world. This research studied the datebases of Taiwan intellectual office patnet(TIPO), United States Patent and Trademark Office(USPTO), European Patent office(EPO), and Patent Abstracts of Japan(PAJ) to analyze the related patents of NFC technique and produce patent map and patnet analysis. This research contains many charts of patent date, including analysis from quantity of historic patents, countries, companies, IPC, patent life cycle, technology matrix, etc. This research results and the patent technique charts can be used to analyze the trend of NFC.
Liu, Ben-Shan, and 劉本善. "A field study on hacker invasion and defensive strategy of information security of ROC government." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/29883542065641285425.
Повний текст джерела國立臺灣大學
商學研究所
94
PRC has built up a modern troop which is using hacker measures as a weapon to invade each level of government units in order to steal conferential data in recent years, and it has endangered the overall national security. Therefore, this research was focus on information status quo of Taiwan government in depth which including “invading path”, “assaulting model” and “security strategy”, in order to clear up usual patterns that hackers are using as a path to break into specific information system,and help to find out adaptive protection strategy for information system. This research has taken 561 sample sizes from units of ROC government as a target, and adopted field study method to test three hypotheses. It has been found that “assaulting model” and “security strategy” were both of significance with “invading path” factor. We hence have concluded two results:First, the different types of invading path that hackers adopted will effect on assaulting manners, it means that hacker assaulting manners are varied depending on invading path. Second, the higher information security grades of the information system, the lesser opportunity the information system being invaded. Results of this study can be referenced to build up protection strategy and counter measure for the information security, and hope it can be of help to the step-searcher.
Hancke, Gerhard P. "Securing real-time field area network using small cards." Diss., 2004. http://hdl.handle.net/2263/24153.
Повний текст джерелаDissertation (MSc)--University of Pretoria, 2006.
Computer Science
unrestricted
Lin, Yung-Fang, and 林永芳. "The Influence of Department Type and Conflict Type on Information Security Awareness:The Field Case Study of a Transport Service." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/mr9jvn.
Повний текст джерела銘傳大學
資訊管理學系碩士在職專班
97
The topic that it is with safe interest to write letters in recent years has already been paid attention to by enterprises gradually, enterprises are devoted to the setting-up of the management system of the information safety while organizing and push, hope to set up the culture of information safety while organizing. But keep pouring in to the incident of information safety, although enterprises make great efforts on information is promoted safely, but still the topic of staying technically, lie in in cognition of information safetying after neglecting the foundation set up of the management system of the information safety, if can''t get the staff''s approval, will cause the effect to be non- good, even cause the staff''s rebounding, and derive the production of various conflicts. This research goes on with the law of case study, promote the management system of the information safety to carry on research to the case company, probe into the conflict and promote roles under different departments type, safe and cognitive influence as to information. The result of study reveals, under different departments type, it will be different that the conflict influences the cognition of information safety. Will not have too many opinions on law and norm that the company make because of the colleague when the unit colleague is from the on-line unit, all stipulate that carry out in accordance with the company, so the probability of having task contradiction law and norm is relatively low. But because the colleagues only care that influence it one''s own homework, hit organizing with information safely as to the cognition of information safety, systematic interconnection with information share, risk management, management control, systematic lifespan chain of command understand intensity to be insufficient to cause, shoulder to influence. And because colleagues have less contact time on ordinary days, while having relation contradiction, will belong to and avoid responsibility, not understand the functions and powers of the pusher of information safety, take precautions against practice and procedure that incident happen in company, return on unit information safety pusher this question responsibility, unfavorable to information safety cognition organize with information safe piece taking shape, shouldering to influence with systematic lifespan chain of command and technological chain of command; In in charge of in the unitting, because working the environmental factor must deal with the incident happening suddenly at any time, regard finishing in task as the direction, will often neglect or simplify the procedure, though pusher of information safety mentions one and is in charge of accusing of personnel''s really observing, but the order which faces the executive can only be acted in accordance with, so the loophole causing the money and fitting, unfavorable to information safety cognition manage chain of command and systematic lifespan control mask shoulder to influence. When the unit colleague belongs to the office unit, facilitate the cognition of information safety to hit and organize with information safely while having task contradiction, until information share, risk management, management control, systematic lifespan chain of command,etc. have positive relation of influencing systematic interconnection. Have relation contradiction, familiar with each other and mutual understanding, work relatively clear promoting, will discuss, propose each other idea each other, so relation conflict cognition of information security organize with information safe piece and systematic lifespan chain of command producing to influence. While having procedure contradiction, while making the operation procedure, the pusher of information safety, with the unit colleague besides one''s own business, still need to be responsible for the demand that the on-line colleague puts forward, simplifies some procedures and is in charge of accusing of for prescroption sometimes, so procedure conflict unfavorable to, promote course information safety cognition systematic interconnection with information share surface, sensitiveness, management control Taxi influence. But help to organize and control Taxi influence with safe one of information and homework; In in charge of in the unitting, it will make duty of everybody, and working content its pay training that there should be, tell the project that colleagues are in charge of accusing of and responsibility that should be shouldered, offer the abundant right the pusher of information safety, require it to shoulder duty supervised, pass interdynamic and exchange each other''s homework, help information safety manage chain of command and systematic lifespan control mask to influence in the cognition.
(7525319), Megan M. Nyre-Yu. "Determining System Requirements for Human-Machine Integration in Cyber Security Incident Response." Thesis, 2019.
Знайти повний текст джерелаКулак, Н. В. "Електронне забезпечення сфери здійснення державних закупівель в Україні". Thesis, 2015. https://er.knutd.edu.ua/handle/123456789/1595.
Повний текст джерелаДиссертация посвящена обоснованию теоретических и методологических основ, разработке научно-практических рекомендаций по электронному обеспечению сферы осуществления государственных закупок. Сфера осуществления государственных закупок является одной из важнейших компонентов финансово-бюджетной системы любой страны мира. Обосновано, что в условиях рыночной экономики, государство не обладает более эффективным и действенным инструментарием регулирования, который способен сбалансировать интересы всех экономических субъектов, чем система осуществления государственных закупок, поэтому постановка задач электронного обеспечения сферы осуществления государственных закупок вызвана тенденциями информатизации мировой экономики. Выявлено, что существующая стратегия управления государственными финансами имеет вектор на гармонизацию нормативно-правового обеспечения сферы осуществления государственных закупок Украины со стандартами Европейского союза (далее ЕС). Таким образом, главной тенденцией развития системы осуществления государственных закупок Украины, является задекларированные властью намерения интегрировать в отечественную систему государственных закупок европейские принципы и традиции, гармонизировать нормативно-правовую базу, синхронизируя отечественную государственную закупочную деятельность с нормами ЕС. Предложен усовершенствованный научно-методический и практический подход к определению критериев оценки готовности регионов Украины к процессу интеграции системы государственных электронных торгов в рыночную и организационно-правовую систему регионов. Обоснована концепция создания механизма сферы осуществления государственных закупок, основанная на принципе формирования целостного функционального цикла, который включает в себя все этапы государственной закупочной деятельности, на базе их электронного обеспечения. Суть концепции состоит в том, чтобы процессы, происходящие в сфере осуществления государственных закупок, трансформировались в единый цикл, начиная от этапа долгосрочного планирования государственных нужд, заканчивая мониторингом надлежащего исполнения условий государственного контракта.
The thesis is devoted to substantiation of theoretical and methodological foundations, developing scientific recommendations for capacity on electronic public procurement in Ukraine. The evolution of scientific views on the conceptual foundations of capacity on electronic public procurement. The features of the market regulatory information capacity on public procurement in Ukraine. Application of methodological approaches to capacity on electronic public procurement. Analyzed national and international experience of state regulation of public procurement. Done decomposition legal and organizational-economic mechanisms of public procurement in Ukraine. Diagnosed condition information capacity on public procurement. The parameters of the formation of a single electronic system for monitoring all stages of procurement in Ukraine. The ways of improving the system structure and mechanism of public procurement. Developed a holistic concept and strategic approaches to capacity on electronic public procurement. Profound principles of state regulation of public procurement on the basis of electronic security. The effective electronic tools capacity on public procurement.