Dissertation > Excellent graduate degree dissertation topics show

The Study and Implement of a Composite Trust Model Based on JXTA

Author: FangSuHua
Tutor: YangYueXiang
School: National University of Defense Science and Technology
Course: Computer Science and Technology
Keywords: Equivalence calculation
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 43
Quote: 0
Read: Download Dissertation

Abstract


Related Dissertations

  1. Honeycomb Panel Finite Element Model Updating Based on Optimization,V414.6
  2. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  3. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  4. One based on pattern matching lightweight network intrusion detection system design and implementation,TP393.08
  5. The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP,TP393.08
  6. Snort intrusion detection system based on improved system design and implementation,TP393.08
  7. Research on Automated Trust Negotiation Framework and A Prototype Design,TP393.08
  8. The Research and Realization of Unwanted Code Monitoring System Based on Heuristic Algorithm,TP393.08
  9. Data Privacy-Preserving Schemes for Cloud Computing,TP393.08
  10. The special trusted computing research and design of the network,TP393.08
  11. Firewall and three switch - based campus network security policy research,TP393.08
  12. Botnet Detection and Prevention System,TP393.08
  13. Research on Network Anomaly Detection Based on Projection Pursuit Regression,TP393.08
  14. Botnet Detection and Prevention System,TP393.08
  15. Dynamic password -based authentication of online banking security,TP393.08
  16. Ship mountain of e-government network security solutions outside the network design and implementation,TP393.08
  17. Botnet Detection and Prevention System-Database and System Integration Solution,TP393.08
  18. Research on Application of Intrusion Detection Based on Improved FCM,TP393.08
  19. Research and Implementation for Single Sign on System Based on PKI,TP393.08
  20. The Solution of Information Systems Security in Financial Enterprise,TP393.08
  21. The Research of Network Intrusion Detection Technologybased on RBFNN-HMM,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile