About 1155 item dissertation in line with Cryptography query results,the following is 1 to 50(Search took 0.076 seconds)
- Research on Digital Image Scrambling Algorithm,LiYongJiang/Xi'an University of Electronic Science and Technology,1/0
- Analysis and Research on the Integration of M2M Networks and3GPP Networks,SunMin/Xi'an University of Electronic Science and Technology,0/12
- Research of (k,n) Threshold Secret Sharing Technology,LiuYanXiao/Xi'an University of Electronic Science and Technology,0/25
- The Trust Management Researches about Trust Quantification-indicate and Credential Fair-exchange,CuiJun/Beijing University of Posts and Telecommunications,0/35
- Strategy Research on Implementation of Identity and Access Management in Enterprise Cloud,ZhaoWenFang/Beijing University of Posts and Telecommunications,0/16
- Design and Security Proof of Multi-Factor Authenticated Key Exchange Protocols,LiuYing/PLA Information Engineering University,0/20
- Design of Information Hiding Algorithms Based on Text,HuJinLong/PLA Information Engineering University,0/75
- Research and Implementation of Key Technology of Intranet Security Management System in Windows7,YangShaoPeng/Beijing University of Posts and Telecommunications,0/79
- The Design and Accomplishment of the Test Tool for Some Key Index of Security Gateway,WangShuo/Xi'an University of Electronic Science and Technology,0/14
- Research on the Fuzzing Test Technology Based on MAC Layer,HanXing/Beijing University of Posts and Telecommunications,0/13
- Research on BLP Access Control Model Based on TNC Architecture,FanJie/Xi'an University of Electronic Science and Technology,0/25
- The Research on the Assessment of the Attack Resistances Based on the Attack Cost and Attack Effect,OuYangMan/Beijing University of Posts and Telecommunications,0/14
- Design and Security Analysis of Anonymous Authenticated Key Exchange Protocols,LiuCong/PLA Information Engineering University,0/34
- Research on Access Control Model Based on Trust Level and Role,ChaYaXing/Xi'an University of Electronic Science and Technology,0/41
- Research and Implement of Secure Channel for Internet E-payments,WuZhiGang/Xi'an University of Electronic Science and Technology,0/33
- The Design and Accomplishment of the Test Tool for Packet-Filter Firewalls,ZuoZhuoXu/Xi'an University of Electronic Science and Technology,0/56
- Research on3G-WLAN Interworking Security from Certificateless Public Key Cryptography,CuiFang/Xi'an University of Electronic Science and Technology,0/47
- Design and Analysis of Attribute Based Authenticated Key Exchange Protocols,WeiJiangHong/PLA Information Engineering University,0/49
- Research on WEB Application Clickjacking Vulnerability and Defense Method,WangJian/Xi'an University of Electronic Science and Technology,0/59
- Design and Formal Analysis of TPM-based Protocols for IaaS and SaaS,CuiWei/PLA Information Engineering University,0/63
- Research of Security Vulnerabilities Detecting Techniques in Web Application,ZhangZhe/Xi'an University of Electronic Science and Technology,0/103
- Research on PHP Web Application Security and Development of Vulnerability Detection Tool,LiuPeng/Xi'an University of Electronic Science and Technology,0/119
- Research on Public Key Security in Space Information Networks,RenFang/Xi'an University of Electronic Science and Technology,0/119
- Research on Survivalbility Routing and Anti-attack Technology in Space Information Networks,HaoXuanWen/Xi'an University of Electronic Science and Technology,0/154
- Research on the Key Technologies of Cross-Domain Authentication,LiXiaoBiao/Beijing University of Posts and Telecommunications,0/349
- Research on Key Thchniques of Sensitive Data Security in Open Environment,ZuoZuoZuo/Beijing University of Posts and Telecommunications,2/792
- Research on P2P Flow Identification and Monitoring and Its Implementation,FanJie/University of Electronic Science and Technology,0/16
- Design and Implementation of Network Traffic Monitoring System,LiuChuang/Beijing University of Posts and Telecommunications,0/39
- Design and Implementation of Network Traffic Inspection and Control System,HuangTing/Beijing University of Posts and Telecommunications,0/43
- Internet Public Opinion Analysis for Short Text,ShiZuo/Xi'an University of Electronic Science and Technology,1/235
- Steganographic Coding and Its Applications in Image Steganography,HanTao/PLA Information Engineering University,0/63
- Study on Steganalysis for Jpeg Images,YangShangZuo/Southwest Jiaotong University,0/28
- News Video Semantic Analysis Based on Multi-modal Features,ZuoJianPeng/Xi'an University of Electronic Science and Technology,0/41
- News Video Structure Analysis Based on Multi-modal Features,LiuJiaZuo/Xi'an University of Electronic Science and Technology,0/23
- Research&Design on Authentication Protocol of RFID,LiJie/Xi'an University of Electronic Science and Technology,1/105
- Research on Security Protocols for RFID Systems,ZhouJingXian/Beijing University of Posts and Telecommunications,0/46
- An Improved Algorithm for Support Vector Clustering,ChengLi/Beijing University of Posts and Telecommunications,0/54
- Research on the Combination of SVM and Adaboost Classification Algorithm,ChenChunPing/Xi'an University of Electronic Science and Technology,0/100
- The Design and Implementation of an Android-Based Remote Control Tool,WangSen/Xi'an University of Electronic Science and Technology,0/93
- Design and Implementation of an Online Payment System Based on J2EE,QiuNing/Beijing University of Posts and Telecommunications,0/48
- Design and Evaluation of Information Hiding Algorithms for Binary Image,FuLei/PLA Information Engineering University,0/49
- Research of PPC Steganography Algorithm Based on Gray Scale Image,ZhaoZeLi/Beijing University of Posts and Telecommunications,0/43
- Design and Implementation Research of Cryptographic Chip Operating System,ZhengBin/PLA Information Engineering University,2/23
- Research of Digital Hologram Watermarking Resistant to Print-Scan Attack,WuQingLe/Southwest Jiaotong University,0/9
- On Analytical Techniques of Monitoring P2P IM Junk Information,LiJianQiang/University of Electronic Science and Technology,0/9
- The Research of Attributes Based Resources Authorizatio Management Standard and Application,ZengShuJuan/Xi'an University of Electronic Science and Technology,0/3
- Research and Design on Credible Counting Technology for Digital Products Trading System,YangLiYing/Xi'an University of Electronic Science and Technology,0/4
- Video Watermarking Technology Based on Simmons Threshold Theory,HuFan/Xi'an University of Electronic Science and Technology,0/4
- Research on Key Technologies of Data Security Towards Cloud Computing,LiuZuoZuo/PLA Information Engineering University,0/48
- Research on Application Security Transparent Supportive Platform Architecture and Model,GongLei/PLA Information Engineering University,0/5
Total 24 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last
© 2012 www.DissertationTopic.Net Mobile
|