About 2884 item dissertation in line with Authentication query results,the following is 1 to 50(Search took 0.056 seconds)
- Research on Enterprises’Financial Management Capability System Establishment and Certification in China,ZhuHuaJian/Dongbei University of Finance,0/43
- Design and Implementation of Campus Network Acounting and Management System,WangChunLi/Yanshan University,0/16
- Design and Realizaton Campus Network Authetication and Accouting System,NanJing/Shaanxi Normal University,0/113
- Authentication and Authorization Design in Social Media Website,MaLiYa(Dixon Maria Nana)/Huazhong University of Science and Technology,0/6
- Research on Access Control Model Based on Role in Cloud Computing Environment,LiChunYan/Tianjin University,0/8
- Research on grid security technology of Portal,ShiYuFa/Nanjing University of Technology and Engineering,0/3
- Active Directory Federation (ADFS) Application Service Based on Unified Identity Authentication in Guizhou Series of Tax System,WangJunLong/Hubei University,0/6
- Research on An Attribute-based Access Control Scheme in Cloud Computing,ZhangZhuLin/Northwest Normal University,0/15
- Identity Authentication Management and Account Mechanism for Cloud Platform,LiuLiLi/Huazhong University of Science and Technology,0/7
- The Research and Analysis on the Security Mechanism of3G-WLAN Converged Network,WeiLin/Central South University,0/8
- Enterprise Network Terminal Control System Design,ZhuJianGang/Ocean University of China,0/5
- Design of Identity Management Platform Based on SML-RBAC,LiuYu/Nanjing University of Posts and Telecommunications,0/6
- The Research on Security Policy and Related Issues for Grid Computing Environment,BaiQingHai/Jilin University,0/93
- Design and Establishment of the Computer Network Security Management System in Vocational Colleges,CaiAng/Tianjin University,0/4
- Under the Environment of Digital Campus Network Authentication Management System Design and Development,HanYue/Dalian University of Technology,0/18
- Research and Implementation of IPv6Stateless Address Auto-configuration System Based on Authentication,ZhaoLi/Northeastern University,0/2
- The Design and Implementation of CA Safe Authentication System Core Functions in E-government,WangJuan/Xi'an University of Electronic Science and Technology,0/18
- Remote Authentication System Based on Face Recognition,WangCong/Harbin Institute of Technology,0/22
- Iris Location Method Based on Multi-line Fitting,HuWanJun/Northeast Normal University,0/7
- Research and Design of Authentication Protocol for Low Cost RFID System,WuXiaoQin/University of Electronic Science and Technology,0/15
- Research and Implement on RFID Security Authentication Technology in Internet of Things,GuoBaoYu/Jiangsu University of Science and Technology,0/6
- Researches on the Key Technologies of UHF RFID Systems,XuanXiuWei/Tianjin University,1/0
- The Study of Methods and Applications of Fingerprint-Based Secure Authentication,ZhangZuoZuo/Xi'an University of Electronic Science and Technology,1/0
- Study on the Key Technologies of Energy Self-sufficiency Low-power Active Tags,MengQingBin/Tianjin University,0/23
- Research on Key Techniques of Image Perceptual Hashing,LiuZhaoQing/Harbin Institute of Technology,0/164
- The Research on Intellectual Property Rights Protection Technique of Color Image,WangChunPeng/Liaoning Normal University,0/12
- Design and Implementation of Biometric Integration System,ZhuangZuo/University of Electronic Science and Technology,0/31
- Identity authentication and identification based on Biometrics,LiChen/Nanjing University of Technology and Engineering,0/4
- Research of Anti-collision Algorithm and Security Protocol in RFID Systems,XiaoFeng/Beijing Institute of Technology,0/69
- Context and Role Based Dynamic Access Control in Distributed Healthcare Information Systems,ABDULKADIR ADAMU ABDULKADIR/Hunan University,0/3
- Data Integration Technology Applied Research for Information Sharing,ChenYuanBin/Harbin Engineering University,0/39
- Authentication of Range and Moving K Nearest Neighbor Skyline Query for Outsourced Spatial Databases,HeYouRui/Yanshan University,0/5
- Design and Realization of Online-Bank Based on the Public Key Infrastructure,CongZuo/Hunan University,0/27
- The Design and Implementation of Personnel Management and Unified Identity Authentication System for Universities,LiuZhenGuo/Jinan University,0/5
- The Design and Implementation of Personnel Information Management System of Dujiangyan Mumicipal Forestry Bureau,QuZuoZuo/University of Electronic Science and Technology,0/8
- Design and Realization of Digital Campus for Middle School Based on Uniform Identity Authentication Technology,ZuoXiaoYu/University of Electronic Science and Technology,0/19
- Design and Implementation of Xinjiang Broadcast Network Uniform Portal System Based on SSO,JiangZuo/University of Electronic Science and Technology,0/22
- Design and Implemention of Smart Card Authentication System,DuanYongFeng/University of Electronic Science and Technology,0/23
- Design and Implement of Web-Based University Equipment Management System,MaChunYu/Xi'an University of Petroleum,0/5
- Design and Implementation of Password-based Authentication System,WanZuoLing/University of Electronic Science and Technology,0/21
- Design and Implementation of the Business Platform of Liaoning Netcom Broadband,LvBo/Dalian University of Technology,0/3
- Research on the Application of Power Marketing System Based on Mobile Platforms,ChenXueZhi/Harbin University of Science and Technology,0/18
- LBH-based Optimal Authenticated Data Structure Model and Application,LiFuXiang/Northeastern University,0/2
- Research and Implementation of Authentication Platform for Administration for Industry and Commerce Business Systems Based on RA,LiuWenYi/Hunan University,0/3
- Implicit Authentication on Mobile Devices,Jane Nduta Kiere/Hunan University,0/1
- Research on Database Encryption Technology for Quality Course Website,GanWenZuo/South China University of Technology,0/22
- Research and Design of Medical Mobile Terminal and Its Access Control Technology,XuLian/Shenyang University of Technology,0/14
- Design and Implementation Based on the Portal Protocol Security Authentication Access,LiuXu/Xi'an University of Electronic Science and Technology,0/18
- Research on Key Technologies of the Identity Authentication Basing on Mobile Phone Acceleration Sensor,LiuZhiDan/Central South University,0/25
- Semantic Web Privacy On XACML and RBAC,XiangXiaoMing/Xiangtan University,0/13
Total 58 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last
© 2012 www.DissertationTopic.Net Mobile
|