About 535 item dissertation in line with Elliptic Curve query results,the following is 1 to 50(Search took 0.02 seconds)

  1. The Research and Analysis on the Security Mechanism of3G-WLAN Converged Network,WeiLin/Central South University,0/8
  2. Research on Applicable ECC Processor for Security Communication of RFID,ChengJian/Huazhong University of Science and Technology,0/3
  3. Big Data Encryption Algorithm Based on Data Deduplication Technology,WangMengMeng/,0/344
  4. Research on Elliptic Curve Cryptography Algorithm in Residue Number System,LiuYanHua/Tianjin University,0/1
  5. Improvement of Twisted Edwards Curve Digital Signature Algorithms and Their Application to Mobile Security,PuChengYan/Harbin Institute of Technology,0/5
  6. Design for Unified Architecture ECC and RSA Cryptographic Processor,LiuBing/Tianjin University,0/1
  7. Multiple Digital Signature Research,YanHua/Qinghai Normal,0/3
  8. The Research About Algorithm of Point Plus and Double Point on Elliptic Curve,SongChunYu/Northwest University for Nationalities,0/16
  9. Research on Some Elliptic Curve Cryptographic Algorithms,YuWei/University of Science and Technology of China,0/85
  10. The Reach on Visual Zero-knowledge Proof of Identity Authentication,ZhaoJian/Anhui University of Technology,0/5
  11. Research of Several Partial Blind Signature Schemes and Its Application to E-Cash,XieHuan/East China Jiaotong University,0/4
  12. Implementation of elliptic curve algorithm authentication technology based on,ZhaoHang/Heilongjiang University,0/16
  13. Design Development and Research of a New Radial Piston Pump,LiuChengKun/Qingdao University of Science and Technology,0/15
  14. Several Diophantine Equations Related with Elliptic Curves,ZhangYong/Zhejiang University,0/3
  15. Research and Implemention of One Time Password Identity Authentication System,HanYongHui/,0/31
  16. The Research and Improvement on Mutual Authentication and Key Agreement,QiShiJie/Jinan University,0/35
  17. Research on One Time Password Mutual Authentication of Smart Terminal Based on ECC,LiuQiao/Taiyuan University of Technology,0/1
  18. Research of Key Exchange and Encrypted Authentication on the Network Card,WangDongHong/Northeast Forestry University,0/43
  19. The Design on the Secure Third-party Mobile Payment Based on WAP,JinHuaWei/Hunan University,0/61
  20. Remote Desktop Protocol Security Analysis,LiuJian/Southwest Jiaotong University,1/140
  21. Design of Password-based Authenticated Key Agreement Protocols,TangHongBin/University of Electronic Science and Technology,0/285
  22. A Research of Security Methods in Commerce RFID Supervision System,ChaiHua/Jilin University,0/30
  23. Research on Security Protocols for RFID Systems,ZhouJingXian/Beijing University of Posts and Telecommunications,0/46
  24. Development of Vehicle Remote Monitoring Management System Based on.NET Platform,LiDongBo/Yanshan University,0/1
  25. The Research of Conifdentiality of End-to-end Based on Mobile Network,MaXiBao/Northeast University of Petroleum,0/31
  26. The Design and Realization of an Distributed Ad Hoc Authentication Scheme Based on CPK,TuYi/Huazhong University of Science and Technology,0/14
  27. Research on real time monitoring wireless sensor network system of artillery,XuFeng/Nanjing University of Technology and Engineering,0/3
  28. Cryptanalysis and Improvement of Two Cryptographic Protocols,MiaoXiaoYu/Hangzhou University of Electronic Science and Technology,0/26
  29. Research and Design A Configurable Processor for Elliptic Curve Cryptography Algorithm,ZhouFaWang/Tianjin University,0/22
  30. Research of Technology of Proxy Signature with Fast Revocation,HuangYueYing/Xi'an University of Electronic Science and Technology,0/10
  31. Design and Analysis on ID-based Proxy Signature,HouXingHua/Northeastern University,0/21
  32. Research and Improvement on Elliptic Curve Scalar Multiplication Algorithm,HeBin/Harbin Institute of Technology,0/7
  33. Study of Cryptosystem Based on the Elliptic Curve,MengLei/Harbin Institute of Technology,0/11
  34. Research on Key Agreement of Airborne Wireless Mobile Ad Hoc Network,HuangHouBiao/PLA Information Engineering University,0/0
  35. On Digital Signature Based on Elliptic Curve Cryptosystem,ZhouMin/Qinghai Normal,0/3
  36. Research of Key Agreement Protocol Based on Certificateless Cryptosystem,TanHongLian/West China University,0/0
  37. A Research on the Cryptography Based on Elliptic Curve Isogenies,HuJin/Wuhan University,0/25
  38. Research of Fast Scalar Multiplication Algorithms on Elliptic Curve,ZhangHaiLing/Yangzhou University,0/17
  39. A Specific and Efficient Key Encapsulation Mechanism,ZuoChunHua/Shandong University,0/9
  40. Research of Secure and Fast Scalar Multiplication Algorithms on ECC,YangZuo/Yangzhou University,0/13
  41. Application of Elliptic Curve Cryptograph in SET Protocol and Software Implementation,LiuLei/Hangzhou University of Electronic Science and Technology,0/12
  42. The Research on Certificateless Signature Scheme Without Bilinear Pairing,WangZuo/Changsha University of Science and Technology,0/7
  43. Ons Security Research Based on Elliptic Curve Cryptosy Stems,ChouZuoZuo/Zhengzhou University,0/13
  44. Research on Several Problems of Pseudorandom Sequences from Elliptic Curves,HuaWenZhao/PLA Information Engineering University,0/18
  45. Accelerating Pollard’s Rho Algorithm on the Elliptic Curve Discrete Logarithm Problem,CaoZuo/Shandong University,0/12
  46. Key Management Scheme in Ad hoc Network Based on ECC,YeAiFeng/Huazhong University of Science and Technology,0/24
  47. Analytical Improvement and Implementation for Internet Key Exchange Protocol,XieZuoRen/Lanzhou University,0/10
  48. Research on Password-based Romote Authentication with Key Agreement Protocol,LiXueLei/Jinan University,0/19
  49. Research on Key Management and Authentication Protocol in the Internet of Things,ZhangLi/Xi'an University of Electronic Science and Technology,0/21
  50. Study of Identity-Based Authenticated Key Exchange Protocol,LiKun/Xi'an University of Electronic Science and Technology,0/20

Total 11 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last

© 2012 www.DissertationTopic.Net  Mobile