Dissertation 

About 121 item dissertation in line with formal analysis query results,the following is 1 to 50(Search took 0.049 seconds)

  1. Examples of Overseas Research Prospective for Chinese Fine Art History,LiuXiaoJie/Central China Normal University,0/0
  2. The Formal Analysis of J.C. Ransom's Poetry Theory,TanShanShan/Xiangtan University,0/30
  3. SysML-based Modeling and Analysis for CTCS-3Train Control System,HeLiZuo/Beijing Jiaotong University,0/11
  4. Formal Analysis Methods of Security Protocols Based on Strand Space Model and its Application,JieYanMing/Hubei Normal University,,0/22
  5. Reserch on Security Protocol Based on Strand Space Theory,ZuoLiLi/Southwest Jiaotong University,0/115
  6. Analvsis and Development on Formal Method of Secruity Protocol Based on Strand Space Model,DongXueWen/Xi'an University of Electronic Science and Technology,1/51
  7. Design and Formal Analysis of TPM-based Protocols for IaaS and SaaS,CuiWei/PLA Information Engineering University,0/63
  8. A Method for Analyzing Electronic Commerce Protocols Based on Knowledge and Faith Model,WeiGang/Yanshan University,0/19
  9. A Combining Deterministic Finite Automaton with Logic Rules Approach for Analyzing of E-commerce Protocol,MaSheng/Yanshan University,0/16
  10. Formal Verification of Security Protocols Implementation by Java,WangWei/Central South University for Nationalities,0/29
  11. Research of Analyzing E-commerce Protocols Based on Colored Petri Nets,LuBei/Yanshan University,0/34
  12. Research on the Roaming Authentication Protocol of the Mobile Network in the Formalization Way,WengYanQin/Hubei Normal University,,0/25
  13. The Research of Mobile Payment Security Protocols Based on Public Key Cryptosystem,LiuLiang/Southwest Jiaotong University,0/59
  14. The Research of Mobile Payment Security Protocols Based on Symmetric Cryptosystem,GaoBaoSheng/Southwest Jiaotong University,1/224
  15. Research and Design for Security Protocols of the Internet of Things Electronic Tags,XiaoFeng/Beijing University of Posts and Telecommunications,0/11
  16. Wide Area Travelling Wave Fault Location Algorithm and Its Formal Verification,ChenYu/Shanghai Jiaotong University,0/141
  17. The Formal Analysis Methods of Wireless Network Security Protocol,ZhangFan/Xi'an University of Electronic Science and Technology,16/749
  18. Security protocols and its BAN logic analysis,YangShiPing/Guizhou University,6/450
  19. The Strand Spaces Theory and Its Application to the Analysis of Security Protocols,LongShiGong/Guizhou University,3/375
  20. The Application Study on Formalism and Model Checking Techniques of Electronic Commerce Protocols,WenJingHua/Guizhou University,2/502
  21. Research on Analysis of Fair Exchange Protocols,XingYuHong/Shandong University,5/229
  22. Research on Commercial Security Policy and Its Formal Analysis,WenHongZi/Institute of Software,6/252
  23. Security protocol analysis theory and method,FanHong/PLA Information Engineering University,14/578
  24. Design and analysis of threshold signature scheme and authentication protocols,WangGuiLin/Institute of Software, Chinese Academy of Sciences,8/487
  25. On Some Key Problems of Mobile Payment System Security,LiuWenZuo/Dalian University of Technology,10/1197
  26. The Research and Application of Formalized Methods of Multi-party Security Protocols Analysis,WangXueMing/Guizhou University,4/346
  27. Formal Analysis and Design of Wireless Network Protocols,YangChao/Xi'an University of Electronic Science and Technology,10/845
  28. Research on Formal Verification Methods of Security Protocols,ShiShuDong/Huazhong University of Science and Technology,5/297
  29. Formal analysis of cryptographic protocols Study,WangQuanLai/PLA Information Engineering University,1/181
  30. Studies on Security Analysis of Cryptographic Protocols,YangYuanYuan/Xi'an University of Electronic Science and Technology,0/232
  31. Study on Key Technologies of Formal Analysis Method of Security Protocols,XieHongBo/University of Electronic Science and Technology,0/160
  32. Generalized Quantifier Theory Research,ZhangShiNing/Nankai University,0/278
  33. Design and Analysis of Security Authentication Protocols,WangHuiBin/PLA Information Engineering University,1/299
  34. Research on Formal Security Protocol Analysis Technology,ZhaoHui/Dalian University of Technology,0/225
  35. Research on Formal Analysis Method of the Security of E-commerce Protocol,LiYunFeng/Southwest Jiaotong University,1/333
  36. Astudy on Xiao Gang’s Pian Ti Wen,MouHuaLin/Sichuan Normal University,2/138
  37. Research on the Security of Space Communication Protocols,FeiXiaoFei/PLA Information Engineering University,0/298
  38. Research on a New Authentication Protocol WCAP for Wireless Communication Network Based on WiMAX,LiRuiXue/Jilin University,0/97
  39. Research and Design of Secure Embedded Operating System Face to Power,MaXiangShun/Jiangsu University,1/82
  40. The Formal Analysis and Control to Security Protocol of Telecommunication for Electric Power System,ChengMinYing/Guangdong University of Technology,0/64
  41. Research on Verification Technology for Non-Repudiation and Fairness of Cryptographic Protocols,FanZuoDan/PLA Information Engineering University,0/43
  42. Research on WAP Based Protocol Framework for Mobile Commerce Secure Payment,SongShanShan/Donghua University,1/362
  43. 3G security enhancements research and authentication and key agreement protocol design,BianRuiZhao/PLA Information Engineering University,4/316
  44. The Extension and Application of Strand Space,ChenLiQiong/Shanghai Jiaotong University,1/82
  45. Research on Combination of Formal Analysis Methods to Security Protocols,HuLei/Nanchang University,0/122
  46. Formal Analysis for Electronic Commerce Protocols,WangBing/Nanchang University,1/126
  47. An Authentication Protocol for OSGi Based on Hybrid Encryption,LiJiaHua/Dalian University of Technology,0/88
  48. The Analysis and Research on Secure Mobile Commerce Protocol,LiWenJuan/Dalian University of Technology,0/189
  49. The Analysis of Security Protocols Based on Colored Petri Nets,HanZuo/Shandong University of Science and Technology,0/167
  50. Automatic Verifying Security Protocols Basing Term Guessing and Hash Forging,WuYan/Nanjing University of Aeronautics and Astronautics,0/34

Total 3 Pages First Previous 1 2 3 Next Last

© 2012 www.DissertationTopic.Net  Mobile