About 3510 item dissertation in line with TN918,Confidentiality of communications and communications security query results,the following is 1 to 50(Search took 0.031 seconds)

  1. Research and Implemcectation of Wireless Enctypted Data Transmission System Using IPSec and VPN,ZhangLi/North China Electric Power University,0/6
  2. Research and Implementation of Secure Voice Communication,YinManGang/Hangzhou University of Electronic Science and Technology,0/30
  3. Authenticated Key Exchange and Proof in eCK Model,TianJing/Northeastern University,0/1
  4. Research on Anonymous Signature Scheme Based on Non-interactive Zero-knowledge Proof,WangLanLan/Northeastern University,0/6
  5. Analysis and Design of Block Ciphers,LiRuiLin/National University of Defense Science and Technology,0/90
  6. Cryptanalytic Methods and Their Applications on Block Ciphers,TangXueHai/National University of Defense Science and Technology,0/114
  7. Optimization Algorithm of S-box Based on Computational Intelligence Optimization,LiYaPeng/National University of Defense Science and Technology,0/9
  8. Research on Identity-based Signature and Multi-signcryption,LiCong/Liaoning Normal University,0/2
  9. The Historical Contributions of Francis Crick on Genetic Code Research,SunYongPing/Inner Mongolia Normal,0/3
  10. Research on Improving Secrecy Capacity in Physical-layer Security,ChenYiJie/Harbin Institute of Technology,0/53
  11. On IP Multicast Nodes Classification and Key Management Technology,GeRuiHai/Harbin Institute of Technology,0/11
  12. Research of (k,n) Threshold Secret Sharing Technology,LiuYanXiao/Xi'an University of Electronic Science and Technology,0/25
  13. Design and Application of One-way High-speed Data Transmission System,MaZongZuo/Graduate Schoo,Chinese Academy of Sciences,0/6
  14. Research and Implementation of Power Analysis Attacks Based on Cryptographic Chip of RSA Algorithm,LiuYaLing/Tianjin University,0/3
  15. Research on Elliptic Curve Cryptography Algorithm in Residue Number System,LiuYanHua/Tianjin University,0/1
  16. Researches on Ternary Sequences of Generalized Cyclotomy,YinLiLi/Nanjing University of Aeronautics and Astronautics,0/3
  17. Improvement of Twisted Edwards Curve Digital Signature Algorithms and Their Application to Mobile Security,PuChengYan/Harbin Institute of Technology,0/5
  18. Design for Unified Architecture ECC and RSA Cryptographic Processor,LiuBing/Tianjin University,0/1
  19. Research on the Hardware Implementation and Anti-attack Features for RSA Cryptographic Algorithm,BaiSongHui/Tianjin University,0/0
  20. Research on Identity-Based Signature Scheme in the Standard Model,GuKe/Central South University,0/158
  21. Distributed Secret Key Generation-based Security in Delay Tolerant Networks,XieYongMing/Central South University,0/65
  22. Based on Bilinear Bairing of the Proxy Signature and Proxy Multi-signature Scheme of Research,DengJunLei/East China Jiaotong University,0/3
  23. Design and Implementation of the ISA Security Communication Algorithm for ICS Playing System,JiangLin/Huazhong University of Science and Technology,0/1
  24. SSL VPN Performance Improvement Research Based on Hardware-accelerated Devices,WuFeng/Huazhong University of Science and Technology,0/5
  25. The Design of AES IP Basesd on Mobile Phone Payment,HanLing/Huazhong University of Science and Technology,0/7
  26. Probabilistic Dictionary Cracking Technology Based on Semantics,LiuZuoWen/Huazhong University of Science and Technology,0/13
  27. Research on Bilinear Pairing Based Proxy Re-encryption,WangHongBing/Shanghai Jiaotong University,0/80
  28. Speech Encryption Algorithm Based on Blind Source Separation,Amna Saga Mohammed Humidan/Changchun University of Science and Technology,0/1
  29. Data Encryption and Decryption Design of AES Algorithm Based on FPGA,ChenYanLong/Changchun University of Science and Technology,0/3
  30. Multiple Digital Signature Research,YanHua/Qinghai Normal,0/3
  31. Research on Attribute Based Encryption Algorithms,LiQinDai/University of Electronic Science and Technology,0/28
  32. The Research and Design of Word-oriented Stream Cipher Base on Chaotic Neural Nerwork,ZhangZePu/Huaqiao University,0/1
  33. The Research and FPGA Implementation of the New Chen-Mobius Encryption Algorithm,WuChunFa/Huaqiao University,0/1
  34. An Research on RSA-Based Probabilistic Public Key Encryption Scheme,LiZuoQi/Central South University,0/12
  35. The Formal Analysis of Security Protocol,GaoGaiQin/Zhejiang Normal University,0/36
  36. Research of Wireless Network Roaming Authentication and Batch Verification,ZhaoQing/Yangzhou University,0/18
  37. Group signature scheme and its properties,ZhangKai/Shaanxi Normal University,0/27
  38. No studies certificate signcryption scheme,LiHuiGe/Shaanxi Normal University,0/13
  39. Research and design on proxy signature scheme,YangLi/Shaanxi Normal University,0/37
  40. Partially Blind Signature Research Based on Bilinear Parings,WangZuo/Hefei University of Technology,0/19
  41. Rth Root Extraction in Finite Fields and a Heuristic Description of FFT,FanTa/Shanghai University,0/1
  42. Quadratic Residue Problem and Cryptanalysis of One Strong Signature Scheme,ShaZuo/Shanghai University,0/1
  43. Research on Cryptographic Properties of Functions and Periodic Sequences Over Finite Fields:Perfect Nonlinear and Linear Complexity,YangMingHui/Hefei University of Technology,0/32
  44. Research on Several Problems of Secret Sharing,ZhangBenHui/Yangzhou University,0/76
  45. Research about Collision Free Security of Hash Algorithms Based on Quasigroup,XuYanPing/Ningbo University,0/1
  46. Two Classes of Bent Functions Over the Finite Field of Odd Characteristic,YuLong/Hubei University,0/3
  47. Efficient Special Group Signature Scheme,LiuMeiLan/Central South University,0/1
  48. The Improved Public-key Encryption Algorithm Based on Finite Field Chebyshev Polynomial and RSA Cryptosystem,TanZuGang/Central South University,0/3
  49. The Research About Algorithm of Point Plus and Double Point on Elliptic Curve,SongChunYu/Northwest University for Nationalities,0/16
  50. Differential-Algebraic Cryptanalysis on SMS4Cryptosystem,WeiHang/Chengdu University of Technology,0/26

Total 71 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last

© 2012 www.DissertationTopic.Net  Mobile