Dissertation 

About 1155 item dissertation in line with Cryptography query results,the following is 1 to 50(Search took 0.076 seconds)

  1. Research on Digital Image Scrambling Algorithm,LiYongJiang/Xi'an University of Electronic Science and Technology,1/0
  2. Analysis and Research on the Integration of M2M Networks and3GPP Networks,SunMin/Xi'an University of Electronic Science and Technology,0/12
  3. Research of (k,n) Threshold Secret Sharing Technology,LiuYanXiao/Xi'an University of Electronic Science and Technology,0/25
  4. The Trust Management Researches about Trust Quantification-indicate and Credential Fair-exchange,CuiJun/Beijing University of Posts and Telecommunications,0/35
  5. Strategy Research on Implementation of Identity and Access Management in Enterprise Cloud,ZhaoWenFang/Beijing University of Posts and Telecommunications,0/16
  6. Design and Security Proof of Multi-Factor Authenticated Key Exchange Protocols,LiuYing/PLA Information Engineering University,0/20
  7. Design of Information Hiding Algorithms Based on Text,HuJinLong/PLA Information Engineering University,0/75
  8. Research and Implementation of Key Technology of Intranet Security Management System in Windows7,YangShaoPeng/Beijing University of Posts and Telecommunications,0/79
  9. The Design and Accomplishment of the Test Tool for Some Key Index of Security Gateway,WangShuo/Xi'an University of Electronic Science and Technology,0/14
  10. Research on the Fuzzing Test Technology Based on MAC Layer,HanXing/Beijing University of Posts and Telecommunications,0/13
  11. Research on BLP Access Control Model Based on TNC Architecture,FanJie/Xi'an University of Electronic Science and Technology,0/25
  12. The Research on the Assessment of the Attack Resistances Based on the Attack Cost and Attack Effect,OuYangMan/Beijing University of Posts and Telecommunications,0/14
  13. Design and Security Analysis of Anonymous Authenticated Key Exchange Protocols,LiuCong/PLA Information Engineering University,0/34
  14. Research on Access Control Model Based on Trust Level and Role,ChaYaXing/Xi'an University of Electronic Science and Technology,0/41
  15. Research and Implement of Secure Channel for Internet E-payments,WuZhiGang/Xi'an University of Electronic Science and Technology,0/33
  16. The Design and Accomplishment of the Test Tool for Packet-Filter Firewalls,ZuoZhuoXu/Xi'an University of Electronic Science and Technology,0/56
  17. Research on3G-WLAN Interworking Security from Certificateless Public Key Cryptography,CuiFang/Xi'an University of Electronic Science and Technology,0/47
  18. Design and Analysis of Attribute Based Authenticated Key Exchange Protocols,WeiJiangHong/PLA Information Engineering University,0/49
  19. Research on WEB Application Clickjacking Vulnerability and Defense Method,WangJian/Xi'an University of Electronic Science and Technology,0/59
  20. Design and Formal Analysis of TPM-based Protocols for IaaS and SaaS,CuiWei/PLA Information Engineering University,0/63
  21. Research of Security Vulnerabilities Detecting Techniques in Web Application,ZhangZhe/Xi'an University of Electronic Science and Technology,0/103
  22. Research on PHP Web Application Security and Development of Vulnerability Detection Tool,LiuPeng/Xi'an University of Electronic Science and Technology,0/119
  23. Research on Public Key Security in Space Information Networks,RenFang/Xi'an University of Electronic Science and Technology,0/119
  24. Research on Survivalbility Routing and Anti-attack Technology in Space Information Networks,HaoXuanWen/Xi'an University of Electronic Science and Technology,0/154
  25. Research on the Key Technologies of Cross-Domain Authentication,LiXiaoBiao/Beijing University of Posts and Telecommunications,0/349
  26. Research on Key Thchniques of Sensitive Data Security in Open Environment,ZuoZuoZuo/Beijing University of Posts and Telecommunications,2/792
  27. Research on P2P Flow Identification and Monitoring and Its Implementation,FanJie/University of Electronic Science and Technology,0/16
  28. Design and Implementation of Network Traffic Monitoring System,LiuChuang/Beijing University of Posts and Telecommunications,0/39
  29. Design and Implementation of Network Traffic Inspection and Control System,HuangTing/Beijing University of Posts and Telecommunications,0/43
  30. Internet Public Opinion Analysis for Short Text,ShiZuo/Xi'an University of Electronic Science and Technology,1/235
  31. Steganographic Coding and Its Applications in Image Steganography,HanTao/PLA Information Engineering University,0/63
  32. Study on Steganalysis for Jpeg Images,YangShangZuo/Southwest Jiaotong University,0/28
  33. News Video Semantic Analysis Based on Multi-modal Features,ZuoJianPeng/Xi'an University of Electronic Science and Technology,0/41
  34. News Video Structure Analysis Based on Multi-modal Features,LiuJiaZuo/Xi'an University of Electronic Science and Technology,0/23
  35. Research&Design on Authentication Protocol of RFID,LiJie/Xi'an University of Electronic Science and Technology,1/105
  36. Research on Security Protocols for RFID Systems,ZhouJingXian/Beijing University of Posts and Telecommunications,0/46
  37. An Improved Algorithm for Support Vector Clustering,ChengLi/Beijing University of Posts and Telecommunications,0/54
  38. Research on the Combination of SVM and Adaboost Classification Algorithm,ChenChunPing/Xi'an University of Electronic Science and Technology,0/100
  39. The Design and Implementation of an Android-Based Remote Control Tool,WangSen/Xi'an University of Electronic Science and Technology,0/93
  40. Design and Implementation of an Online Payment System Based on J2EE,QiuNing/Beijing University of Posts and Telecommunications,0/48
  41. Design and Evaluation of Information Hiding Algorithms for Binary Image,FuLei/PLA Information Engineering University,0/49
  42. Research of PPC Steganography Algorithm Based on Gray Scale Image,ZhaoZeLi/Beijing University of Posts and Telecommunications,0/43
  43. Design and Implementation Research of Cryptographic Chip Operating System,ZhengBin/PLA Information Engineering University,2/23
  44. Research of Digital Hologram Watermarking Resistant to Print-Scan Attack,WuQingLe/Southwest Jiaotong University,0/9
  45. On Analytical Techniques of Monitoring P2P IM Junk Information,LiJianQiang/University of Electronic Science and Technology,0/9
  46. The Research of Attributes Based Resources Authorizatio Management Standard and Application,ZengShuJuan/Xi'an University of Electronic Science and Technology,0/3
  47. Research and Design on Credible Counting Technology for Digital Products Trading System,YangLiYing/Xi'an University of Electronic Science and Technology,0/4
  48. Video Watermarking Technology Based on Simmons Threshold Theory,HuFan/Xi'an University of Electronic Science and Technology,0/4
  49. Research on Key Technologies of Data Security Towards Cloud Computing,LiuZuoZuo/PLA Information Engineering University,0/48
  50. Research on Application Security Transparent Supportive Platform Architecture and Model,GongLei/PLA Information Engineering University,0/5

Total 24 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last

© 2012 www.DissertationTopic.Net  Mobile