About 46 item dissertation in line with BAN logic query results,the following is 1 to 50(Search took 0.099 seconds)

  1. The Formal Analysis of Security Protocol,GaoGaiQin/Zhejiang Normal University,0/36
  2. Research on RFID security protocol,LiBin/Fudan University,1/150
  3. Study on Node Authentication Mechanism in Wireless Mesh Network,Du/Beijing Jiaotong University,0/65
  4. Research on the Roaming Authentication Protocol of the Mobile Network in the Formalization Way,WengYanQin/Hubei Normal University,,0/25
  5. Research on Secure Authentication Protocols in Various Application Environments,ChengZiYao/Beijing Jiaotong University,0/98
  6. The Research on RFID Mutual Authentication Protocol Based on Hash-Chain,ZhouZuo/Southwest Jiaotong University,1/144
  7. Security protocols and its BAN logic analysis,YangShiPing/Guizhou University,6/450
  8. Ad Hoc network routing protocol security analysis method,WangYingLong/Shandong University,1/595
  9. Logic security analysis of cryptographic protocols - A New BAN-like logic,LiYiFa/PLA Information Engineering University,12/223
  10. Computer communication network security protocol analysis,ZhangYuQing/Xi'an University of Electronic Science and Technology,16/626
  11. Logic Analysis and Design of Cryptographic Protocols,ZhengDong/Xi'an University of Electronic Science and Technology,8/288
  12. Analysis and Design of Authentication Protocols,TianJianBo/Xi'an University of Electronic Science and Technology,11/433
  13. Research on Formal Verification Methods of Security Protocols,ShiShuDong/Huazhong University of Science and Technology,5/297
  14. Designing and Realizing of Network Authentication System Based on Fingerprint Encryption,LiZhen/Changsha University of Science and Technology,4/276
  15. Wireless LAN Security Mechanism,ZhaoYuJuan/Zhengzhou University,0/189
  16. Research and Improvement of UMTS access security,WangLei/Nanjing University of Technology and Engineering,0/79
  17. Application on the Formal Logic Method in Analyzing Authentication Protocols and Electronic Business Protocols,HeJiaLiang/Jilin University,4/188
  18. Analysis and Research of Electronic Commerce Protocol Property Based on Logic,BianPeiQuan/Lanzhou University of Technology,2/63
  19. The Research and Application of Some Key Technologies of Information Security,WangChangJing/Jiangxi Normal University,1/354
  20. Analysis and Evaluation of Cryptographic Protocols Based on Timed Petri Nets,ZhangGuangSheng/Shandong University of Science and Technology,2/184
  21. Security protocol analysis method comparison and research,ZhaoLin/Zhengzhou University,0/151
  22. Research on the Formal Analysis Technology to Security Protocols Based on Strand Space Model,LiuBing/Shandong University,1/152
  23. Research on Formal Analysis of RFID Security Protocols and DRAP Protocol’s Establish,HuYouJun/Yanshan University,3/348
  24. Study of the Secure Access Control Method of Wireless Local Area Network (WLAN),QianZuo/Southeast University,1/249
  25. Research on Formal Analysis of Three-party Cryptographic Protocols,ZhangTieGang/PLA Information Engineering University,1/72
  26. Research on the Reliability of the Authentication Logic System,RongKun/PLA Information Engineering University,1/36
  27. Security Analysis and Implementation of Internet Key Exchange Protocol,ZhangChunYu/Hohai University,4/108
  28. Token-Based Single Sign-On Protocol and Its Application,ShenZuo/Xi'an University of Electronic Science and Technology,1/147
  29. The Design and Study on an Identity-based Authentication Architecture for Mobile IPv6,LiuJianHua/Chongqing University,1/176
  30. Security Protocol Analysis and Verification Based on Model Checker SPIN,SunShouQing/Lanzhou University,3/331
  31. Research on Key Management of Secure Multicast,ZhangYing/PLA Information Engineering University,2/188
  32. The Design and Implementation of Bluetooth security protocol,ZhuXiang/PLA Information Engineering University,4/370
  33. The Study and Design on Secure Micro-Payment System,LianBin/Southwest Jiaotong University,2/231
  34. Research and Application of Fingerprint Encrypt-based Authentication in Networking Environment,ChenFei/Nanjing University of Information Engineering,3/322
  35. A Research on the Formal Analysis of Quantum Cryptography Protocols,ZhangSheng/National University of Defense Science and Technology,0/79
  36. Research and Implementation of WAPI Authentication Mechanism,QinXingQiao/National University of Defense Science and Technology,0/108
  37. Research of Related Authentication Mechanism of WLAN,KangZhongYi/Changsha University of Science and Technology,3/179
  38. A Study on OTP Identity Authentication in Mobile Commerce,SuJunRu/Beijing Jiaotong University,1/105
  39. Research and Design of RFID Security Authentication Protocol,YuTianTian/Southwest Jiaotong University,9/516
  40. Research and Design of EAP Authentication Scheme Based on One Time Password,GuoJun/Harbin University of Science and Technology,1/81
  41. The Research and Implement of Access Control Mechanism Based on SSL Protocol,RenTao/Hunan University,1/98
  42. Research and Design of RFID security authentication protocol based on Hash function,LiZhiQuan/Taiyuan University of Science and Technology,1/108
  43. An Novel BAN-Liked Logic for Security Protocol Analysis and Its Automatic Implementation,WangEnJun/Zhejiang University,0/29
  44. Study of Off-line Authentication Model for Mobile Electronic Commerce,ChenWenXing/Chongqing University of Posts and Telecommunications,0/57
  45. And type of defects in anti-replay attack authentication protocol design and analysis,WangZhengCai/Guizhou University,0/31
  46. Pervasive systems model of privacy protection,LongZuo/Central South University,0/115

Total 1 Pages First Previous 1 Next Last

© 2012 www.DissertationTopic.Net  Mobile