Dissertation 

About 9538 item dissertation in line with TP30,General issues query results,the following is 1 to 50(Search took 0.052 seconds)

  1. Research on Privacy Preservation in Social Network,SongWenLue/Nanjing University,0/25
  2. Research of Multimedia Information Hiding Technology Based on Chaos,WangXueFeng/Northeastern University,0/0
  3. Research on Memory Protection of Windows Application,MaJianKun/Nanjing University,0/7
  4. Research and Implementation of PrivacyCA Scheme Based on Short Group Signature,TangZiLiang/Northeastern University,0/1
  5. LBH-based Optimal Authenticated Data Structure Model and Application,LiFuXiang/Northeastern University,0/2
  6. Design and Implementation of Cloud Storage Security System,LiuXiangWen/Huazhong University of Science and Technology,0/17
  7. The Design and Implementation of the Cloud Data Integrity Audit System,CaiQiQuan/Huazhong University of Science and Technology,0/17
  8. The Risk Assessment and Improvement of City Card Information System,LiuYaJuan/Xi'an University of Electronic Science and Technology,0/2
  9. The Algorithm Researches of Digital Text Watermarking,LiXiang/National University of Defense Science and Technology,0/25
  10. Research on File Security Structure in a Work Group,GaoZhenXiangZi/Dalian University of Technology,0/1
  11. Research on Evaluation Techniques of Reputation Mechanisms in Autonomous Resource Aggregation,LiuWei/National University of Defense Science and Technology,0/23
  12. Research on Key Techniques of Data Protection Oriented Service Emergency Response,WuJiangJiang/National University of Defense Science and Technology,0/64
  13. Digital image information hiding and Watermarking Algorithm Research,GanTian/Nanjing Normal University,0/23
  14. Research on Security Control of File System,LiuChengBin/Dalian University of Technology,0/0
  15. Study on Application of Parallel Computing Based on GPU,ZhaoBingCai/National University of Defense Science and Technology,0/41
  16. Realization of Image Encryption Using DES and MD5,WISAM HAMIDAH/Hunan University,0/2
  17. Research on Image Tapmer Localization and Copyright Protection Based on Digital Watermarking,YangQunTing/Nankai University,0/31
  18. Research on Binary Code Path Obfuscation,WangZhi/Nankai University,1/0
  19. Automated Risk Management Framework for Cloud Computing Environment,TOKINOMENJANAHARY Fitarikandro/Hunan University,0/2
  20. Research and Implementation of Authentication Platform for Administration for Industry and Commerce Business Systems Based on RA,LiuWenYi/Hunan University,0/3
  21. Implicit Authentication on Mobile Devices,Jane Nduta Kiere/Hunan University,0/1
  22. Research on Information Security Risk Self-assessment of the People’s Bank of China Provincial Branches,LiHongFeng/Harbin University of Science and Technology,0/12
  23. Research of Image Digital Watermarking Based on Fractional Fourier Transform,LiuChangYong/Harbin Institute of Technology,0/66
  24. Research on Web Mining Service Platform and Data Backup Technology,HeXiaoChun/Harbin Institute of Technology,0/17
  25. Research of Security Assessment for Cloud Service Based on Data Flow,ZhouZiXi/Harbin Institute of Technology,0/55
  26. The Research of Robust Image Watermarking Technology Against Geometric Attacks,MiaoZuoNa/Liaoning Normal University,0/3
  27. Research on digital audio zero watermarking algorithm based on transform domain,LiHui/Jiangxi University of Technology,0/21
  28. Image Encryption Algorithm Based on Chaos System Scrambling and Radon Transforms Scrambling,WuJingJing/Harbin Institute of Technology,0/16
  29. Analysis and Improvement of Data Encryption Algorithms,ZhaoXu/Harbin Institute of Technology,0/84
  30. Research on Image Encryption Method Based on Chaos and Fractional Fourier Transform,SongJunHong/Harbin Institute of Technology,0/40
  31. Research on Image Digital Watermarking Algorithm Based on Chaotic Theory and Wavelet Transform,ZhangJinHe/Harbin Institute of Technology,0/11
  32. Real Vector Power Weighted Unitary Transformation Encryption Algorithm of Optical Image,ZhaoTieYu/Harbin Institute of Technology,0/14
  33. Design and Implementation of TPM-based Trusted Embedded Platform,LiRan/Harbin Institute of Technology,0/36
  34. Design and Implementation of the Combination of Image Compression and Encryption Technology Based on Cross Chaotic Map,ShiHongYu/Harbin Institute of Technology,0/28
  35. Evaluating the Human Factor in Information Security Risk Management in Business Organizations,Carlos Ankora/Hunan University,0/2
  36. Research on Anonymity Techniques for Personalization Privacy-preserving Data Publishing,WangBo/Harbin Engineering University,0/71
  37. Application Research on Storage Virtualization Technology for Financial Data Disaster Backup,ChenJie/Henan University of Science and Technology,0/21
  38. Application of Information Security Technology in the Online Banking of Rural Credit Cooperative,ZhouYiMin/Hunan University,0/52
  39. Research on Process and File Protection in Operating System Security Reinforcement,WangQuanMin/Tianjin University,0/43
  40. Research on the Image Secret Sharing Methods,LiPeng/Harbin Institute of Technology,0/95
  41. The Full Life Cycle of the Data Security Technology in the Cloud Computing,LiuXiaoYi/University of Electronic Science and Technology,0/19
  42. Research on Privacy Protection Based on K-anonymity,RenXiangMin/Harbin Engineering University,0/70
  43. The Study of PCIe Interface Encryption Card Driver under the Linux,XuKaiJie/Hangzhou University of Electronic Science and Technology,0/7
  44. Cloud Security In-depth Research of the Solution,LuoEnZuo/Central South University,0/40
  45. Based on the Theory of Chaos Encryption Algorithm,HuangGe/Central South University,0/7
  46. A New Method Based on Digital Signature and Digital Watermark Online Trading Agreement,WuZuoBin/West China University,0/8
  47. Research and Application of Identification Management Based on Two Dimensional Barcode,LinHai/Tianjin University,0/6
  48. Robust Image Watermarking Based on MSER,ZhangXueJuan/Tianjin University,0/9
  49. A Study on Word Document Decryption Based on GPU,TianZuo/Tianjin University,0/9
  50. Research on Goup Blind Signature Application in Multiple-bank Electronic Cash System,JiZuoWei/East China Jiaotong University,0/7

Total 191 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last

© 2012 www.DissertationTopic.Net  Mobile