Dissertation > Excellent graduate degree dissertation topics show

The identity of a hierarchical structure Cryptosystem

Author: LiuZhongRen
Tutor: XuLi;ChenZhiDe
School: Fujian Normal University
Course: Applied Mathematics
Keywords: Encryption status Public key cryptography Key Management Secret Sharing Threshold Technology
CLC: TN918.2
Type: Master's thesis
Year: 2009
Downloads: 15
Quote: 0
Read: Download Dissertation

Abstract


Related Dissertations

  1. Secret sharing scheme,TN918.1
  2. Group Key Management in Wireless Sensor Networks,TN918.82
  3. Study of several secret sharing scheme,TN918.1
  4. Data Privacy-Preserving Schemes for Cloud Computing,TP393.08
  5. Research on the Key Management Scheme in Secure Multicast for Wimax,TN918.82
  6. Research of the Rational Secret Sharing Technology,TN918.1
  7. Identity-based NVD remote key system design and implementation,TN918.2
  8. Identity passwords on key management,TN918.2
  9. Secure Distributed Data Storage in Wireless Sensor Networks,TP212.9
  10. A Research on Trust Based Access Control in P2P Network,TP393.08
  11. Some Studies on Threshold Secret Sharing Schemes,TN918.1
  12. Algorithm Design and Application Research of the Improved ECC-based Self-Certified Public Key,TN918.1
  13. Research on Multi-secret Sharing Visual Cryptography Scheme,TP309.7
  14. A Study on the Security Technology of Mobile Ad Hoc Network,TN929.5
  15. Secret Sharing and Application of Secret Sharing in Proxy Signature,TN918.1
  16. Design and Application of the Threshold Signature Scheme,TN918.1
  17. Secret Sharing Scheme in the Application of Electronic Voting,O29
  18. Constructions of Visual Cryptography Schemes with the Applications,TN918.1
  19. Research and Application of secret sharing based on special privileges,TN918.1
  20. New Multi-Secret Sharing Scheme,TN918.1
  21. The Study of the Secret Sharing Based on the Graph Structure,TN918.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Password, machine
© 2012 www.DissertationTopic.Net  Mobile