Dissertation 

About 306 item dissertation in line with Anonymous query results,the following is 1 to 50(Search took 0.099 seconds)

  1. Research on Key Technologies of Anonymous Communication Based on Peer-to-peer Network,MaZuo/Tianjin University,0/8
  2. A Data Release Method for Social Network Privacy Protection,WangJianChao/Harbin Engineering University,0/65
  3. A K-anonymity Algorithm Based on Jensen-Shannon Divergence,WangYuGui/Harbin Engineering University,0/8
  4. A K_anonymity Algorithm Based on Determining Intervals of Generalization by Sampling,LiMingQing/Harbin Engineering University,0/11
  5. Anonymous Technology Research in Data Publishing,ShangZongMin/Harbin Engineering University,0/28
  6. A Privacy Anonymous Method Based on Constraint,QinTieShuai/Harbin Engineering University,0/13
  7. Research and Application Based on the Trusted Platform Anonymous Authentication Scheme,LiuLiang/Beijing University of Technology,0/61
  8. Research of Olap Technology Over K-Anonymous Data,ZhangJunBao/Donghua University,0/13
  9. Research of Mining Algorithm on K-Anonymous Data Sets,ChenAiDong/Donghua University,0/83
  10. Research on Node Anonymous Protection in Ad Hoc Networks,LiuFangBin/Nanjing University of Technology and Engineering,0/101
  11. An Electronic Voting Scheme Based on Fully Homomorphism Encryption,ZhuZhengYang/Guangzhou University,0/54
  12. Anonymous investment equity transfer legal effect of research - from the perspective of limited liability company,GuoPeng/Shanghai Academy of Social Sciences,0/30
  13. Study on the Identification of the Actual Investor Shareholder Qualification,MaoWeiGang/Central South University,0/18
  14. Study on Legal Issues of Dormant Shareholders,ZhangChunYan/Shenyang Normal,0/5
  15. The Anonymous Contrition Legal Issues in the Perspective of Reliance Interest,WangXiaoMei/Xiamen University,0/11
  16. Study on Family Ethic Dramas of Anonymous Writers and Role Patterns in Yuan Dynasty,XuZuoZuo/Shaanxi Institute of,0/1
  17. Research on Authentication and Key Agreement in Pervasive Computing Environments,HuoShiWei/PLA Information Engineering University,0/19
  18. Research on Anonymous File Distribution Technology in P2P,TaoFuGui/Harbin Engineering University,0/7
  19. P2P anonymous communication technology based on hidden,XuFanWen/Beijing University of Posts and Telecommunications,0/17
  20. Research about Server Concealing Based on Structured P2P,PangBo/Shanghai Jiaotong University,0/19
  21. Research on the key technology of distributed anonymous communication,YuHongBo/University of Electronic Science and Technology,0/41
  22. Research on Location Privacy Protection Models and Algorithms Based on Casper,SiChao/South China University of Technology,1/60
  23. Attack technique of nearest neighbor based social network,ZhaoYanCang/University of Electronic Science and Technology,0/111
  24. A Research on Social Network Privacy Protection Method,LiTianZuo/Harbin Engineering University,0/115
  25. The social network graph generalization based on privacy protection,YuFang/University of Electronic Science and Technology,0/130
  26. Research on Authentication and Key Management Techniques for Wireless Community,GuJie/Shanghai Jiaotong University,0/286
  27. Research on P2P-based Anonymous Communication Mechanism,LiBo/Hunan University,0/13
  28. The Research on Anonymity Authentication and Traceability of P2P Network,WangXiaoLiang/Hunan University,0/71
  29. Research of Mining Algorithm of K-Anonymous Data Sets Based on Generalization Tree,LiuYiLong/Donghua University,0/54
  30. Digital Watermarking Algorithm for Two-dimensional CAD Grapics,ZhaoSuJuan/East China Jiaotong University,0/35
  31. Research of the Privacy Protection Based on Dynamic Data Publication,YuJinYing/Beijing University of Technology,0/9
  32. Research on Schemes of PKI/PMI-based Anonymous Authentication,HeJingJing/Henan University,0/0
  33. Anonymous Method Research Based on the Trajectory Privacy,QuHao/University of Electronic Science and Technology,0/18
  34. Research of Personal Privacy Anonymous Method,LiShouWei/Harbin Engineering University,0/35
  35. Anonymous authentication proxy ring signature -based study,WangYiLin/Yunnan University,0/27
  36. Reasoning-based Data Protection Technology of E-commerce Privacy,GongLiFei/Hunan University,0/39
  37. Research on Anonymous Method for Location-based Privacy Preserving,GuoNa/Harbin Engineering University,0/69
  38. Research on Privacy Data Protection in Wireless Sensor Networks,WangBaoWei/Hunan University,0/136
  39. Research on Location Privacy Protection Model and Algorithm Based on Anonymous Area Scaling,XiaoYanFang/South China University of Technology,0/202
  40. Research on Anoymous Routing Protocols for Mobile Ad Hoc Networks,WuJianJun/Lanzhou University of Technology,0/26
  41. Research on Anonymous Secure Communications in Wireless Ad Hoc Networks,FuHuiMing/Henan University,0/31
  42. Research on the Security Technologies of Mobile Smart Terminal by Using Trusted Computing,FangMingWei/Huazhong University of Science and Technology,0/577
  43. Research of Key Management and Authentication Mechanisms for Ad Hoc Network,XuShuaiWen/Jinan University,0/21
  44. Design and implementation of anonymous communication system based on the re routing,WangXiaoSong/Fudan University,0/12
  45. Study on Privacy-preserving Cryptography Algorithms,ZengZuoZuo/University of Electronic Science and Technology,0/22
  46. Proxy Signature Scheme with Security Based on Elliptic Curve,WuChengXiang/South China University of Technology,0/45
  47. Anonymous Authentication Protocols for Audio and Video Communication Over Wireless Roaming Networks,JiangChunLin/Central South University,0/66
  48. Research on Protection of Query Privacy in Location Based Services,NiuHongWei/Yanshan University,0/81
  49. Research of Several Electronic Voting Schemes,YuanHao/East China Normal University,0/119
  50. Studies in Group-Oriented Anonymous Protocols with Practicality,LiuXin/Shandong University,0/136

Total 7 Pages First Previous 1 2 3 4 5 6 7 Next Last

© 2012 www.DissertationTopic.Net  Mobile