Dissertation 

About 267 item dissertation in line with security protocol query results,the following is 1 to 50(Search took 0.091 seconds)

  1. Research and Application of Network Monitor,YuJiLai/Hunan University,0/1
  2. Digital Copyright Technology in Mobile Electronic Payment Model of the Transplantation,LiXia/Hunan University,0/7
  3. Research on Security Protocol Formal Verification Tools Automatically AVISPA,ZhaoGuoWei/Jilin University,0/46
  4. RFID Security Protocol Based on Public-key Algorithm of Chaotic Neural Network,LinChuanChao/Huaqiao University,0/2
  5. The Formal Analysis of Security Protocol,GaoGaiQin/Zhejiang Normal University,0/36
  6. Matrix Model for Strand Space Theory,SunJianYan/Dalian Jiaotong University,0/1
  7. Research on Security Architecture for Highway Vehicle Network,BoLiNa/Tianjin University,0/15
  8. Research on Interactive Security Protocol Analysis Based-on Uinversal Composable,QiQingLei/Henan University of Technology,0/14
  9. Research and Implementation of Multi-objective-language-oriented Automatic Code Generation for Security Protocols,LiShuaiTuan/Xi'an University of Electronic Science and Technology,0/13
  10. An Approach to Automatic Security Protocol Analysis Based on Authentication Tests,HanXiuMeng/Southwestern University of Finance and Economics,0/14
  11. Reserch on Security Protocol Based on Strand Space Theory,ZuoLiLi/Southwest Jiaotong University,0/115
  12. Analvsis and Development on Formal Method of Secruity Protocol Based on Strand Space Model,DongXueWen/Xi'an University of Electronic Science and Technology,1/51
  13. The Research and Development of Light RESTful Web Service Security Protocol in Mobile Platform,JinZhiChao/East China University of Science and Technology,0/49
  14. The HTTP protocol access monitoring system based on Web,ZhangYi/University of Electronic Science and Technology,0/100
  15. Study on Theory and Applications of Security Protocols Formal Analysis,LuLaiFeng/Xi'an University of Electronic Science and Technology,0/260
  16. The Design and Analysis of RFID Security Prococol,GuoLinFeng/Zhengzhou University,1/153
  17. Research on Distributed Access Control System Based on RFID and3G Wireless Communication,ZhangYanWei/Zhejiang University of Technology,0/46
  18. The Research of Secuirty Protocol in RFID System Based on Theory of Chaotic Cryptography,ZhaoZuoHua/Hunan University,0/24
  19. The Algorithms Based on RFID Technology and its Application Research,QiShiDong/Lanzhou Jiaotong University,0/2
  20. Research on RFID Security Protocols Based on Hash Function,HeJiaLiang/Jilin University,0/333
  21. Research on State Space Reduction Technology for Security Protocol Based on Partial Order Reduction,MaYaNan/PLA Information Engineering University,0/25
  22. Research and Application of Physical Unconable Function,ZhangZiZuo/PLA Information Engineering University,0/1
  23. A New Rfid Security Protocol of Combining AES and Hash Algorithm,WangHuiZi/Henan Normal,0/21
  24. Application and Research of Chaos Technology in RFID Security Authentication Protocol,WangYan/Hebei University of Engineering,0/27
  25. Research of Multi-Pattern Matching Algorithm in the Mobile Internet Protocol Identiifcation,ZhuZuoZuo/WRI,0/97
  26. Research on Secure Mechanism for Position-based Routing in VANETs,HouJie/Beijing Jiaotong University,0/98
  27. Multimedia Messaging Service Encryption and Transmission Mechanism Based on Android System,RuanYuLong/Sun Yat-sen University,0/151
  28. Research on Key Simulation Technologies of Multilayer Satellite Networks Based on Inter-satellite Links,LiHongZuo/PLA Information Engineering University,0/197
  29. Study of Testing Technologies for WLAN Security Protocol and Implementation of the Testing Systems,CaiKai/Xi'an University of Electronic Science and Technology,0/34
  30. Design and Implementation of a Secure Wireless Mesh Network Fast Switching Protocol MESH-FT,SunDeDong/Xi'an University of Electronic Science and Technology,0/3
  31. The Research on Security of Routing Protocol in Mobile Ad Hoc Networks,LiuYan/Wuhan University of Science and Technology,0/47
  32. Research and Application of Data Privacy-preserving in WSN,NiWeiWei/University of Electronic Science and Technology,0/22
  33. The Design and Security Research of6Lowpan Embedded Gateway,ZhouYuanYuan/Shandong University,0/172
  34. The Study of the Internet of Things Perception Layer Security Protocol Based on Symmetric Polynomials,HuangYu/Liaoning University,0/10
  35. Research on Safe Mobile Payment Based on Improved3-D Secure Protocol,MaDing/Xi'an University of Petroleum,0/35
  36. Application of Authentication Technology and Secure Communication Technology in the Enterprise Service System,RenJianBo/South China University of Technology,0/12
  37. Analysis and Research on the Security Protocols Based on Provable Security,ZhouJing/Zhengzhou University,0/29
  38. The Research of Mobile Payment Security Protocols Based on Public Key Cryptosystem,LiuLiang/Southwest Jiaotong University,0/59
  39. The Research on RFID Mutual Authentication Protocol Based on Hash-Chain,ZhouZuo/Southwest Jiaotong University,1/144
  40. The Research of Mobile Payment Security Protocols Based on Symmetric Cryptosystem,GaoBaoSheng/Southwest Jiaotong University,1/224
  41. On the Protocol and Security Problems in Delay Tolerant Networks,LiuShiJun/Shanghai Jiaotong University,0/54
  42. Research and Design for Security Protocols of the Internet of Things Electronic Tags,XiaoFeng/Beijing University of Posts and Telecommunications,0/11
  43. Research on Structures and Normal Forms of Security Protocols,TaoHongCai/Southwest Jiaotong University,1/302
  44. Research on Primitives of Secure Multi-party Quantum Computation,YangWei/University of Science and Technology of China,2/367
  45. A Study of Some Key-Techniques of PKI and It’s Application,FengGuoZhu/National University of Defense Science and Technology,1/818
  46. Security protocols and its BAN logic analysis,YangShiPing/Guizhou University,6/450
  47. The Strand Spaces Theory and Its Application to the Analysis of Security Protocols,LongShiGong/Guizhou University,3/375
  48. Security Issues in Pervasive Computing,LiShiQun/Shanghai Jiaotong University,6/879
  49. Oblivious transfer protocol,ChenZhiDe/Fudan University,0/280
  50. Research on Formal Verification Methods of Security Protocols Based on Strand Space Model,LiXieHua/Shanghai Jiaotong University,5/474

Total 6 Pages First Previous 1 2 3 4 5 6 Next Last

© 2012 www.DissertationTopic.Net  Mobile