About 93 item dissertation in line with Bilinear pairing query results,the following is 1 to 50(Search took 0.019 seconds)

  1. Based on Bilinear Bairing of the Proxy Signature and Proxy Multi-signature Scheme of Research,DengJunLei/East China Jiaotong University,0/3
  2. Research and Implemention of One Time Password Identity Authentication System,HanYongHui/Shenyang Aerospace University,0/31
  3. Provably Secure Identity-based Signature Scheme,ShiBaoMing/Lanzhou University of Technology,0/45
  4. Research on Searchable Encryption Technique in Cloud Environment,DingMaoZhen/Beijing University of Posts and Telecommunications,0/85
  5. Research on the Identity-based Digital Signature for Mobile Communication Technology,YuanJing/Huazhong University of Science and Technology,0/26
  6. Design and Analysis of Public Key Broadcast Encryption Schemes,WangQingBin/PLA Information Engineering University,0/35
  7. Verifiable Secret Sharing Over Bilinear Groups and Its Applications,ZhangJie/Nanjing Normal University,0/0
  8. Research of Key Agreement Protocol Based on Certificateless Cryptosystem,TanHongLian/West China University,0/0
  9. Fault Attacks in Pairing-Based Cryptography,DouYunQi/PLA Information Engineering University,0/2
  10. The Research of (t,n) Threshold Signature Scheme Without Trust Part,XuYan/Southwest Jiaotong University,0/11
  11. Research on Two Kinds of Group Oriented Digital Signature,WangZuo/Xi'an University of Electronic Science and Technology,0/7
  12. A Specific and Efficient Key Encapsulation Mechanism,ZuoChunHua/Shandong University,0/9
  13. Research on Efficient Signcryption Technology and Application in Manufacturing Production Process,ZuoXueGuang/Jinan University,0/8
  14. Research on the Proxy Signature System,LiWei/Xi'an University of Electronic Science and Technology,0/20
  15. Research and Implementation of Public Key Encryption Schemes with Keywords,ZhangZeYue/Xi'an University of Electronic Science and Technology,0/26
  16. Design and Development of a Payment Authentication System of E-bank Based on Short Signature,WangKang/Xi'an University of Electronic Science and Technology,0/46
  17. Research on Pairing and Discrete Logarithm Problem in Elliptic Curve Cryptography,WengJiang/PLA Information Engineering University,0/40
  18. Research on Certificateless Public Key Encryption,SuYanFang/Xi'an University of Electronic Science and Technology,0/49
  19. Research and Application of Ring Signature Arithmetic in MANETs,HeJian/Xi'an University of Electronic Science and Technology,0/43
  20. Analysis and design of oblivious transfer protocol,ZhangWenZuo/Heilongjiang University,0/42
  21. Analysis and Design on Certificateless Digital Signature Schemes,GuoLingLing/Fujian Normal University,0/44
  22. The Research of Several Kinds of Threshold Digital Sienature Schemes,XieDong/Hangzhou Normal University,0/37
  23. Research on Aggregate Signature and Signcryption,WenYiLing/Xi'an University of Electronic Science and Technology,0/76
  24. Research on Certificateless Digital Signatures,WangLiSha/Shaanxi Normal University,1/37
  25. Elliptic Curve Cryptography Based Group Signatures and Mplementation on Electronic Cash,AoSiMan/University of Science and Technology of China,0/70
  26. One-Pass Key Establishment for Anonymous Wireless Oaming with Formal Security Model and Proof,WangYuan/University of Science and Technology of China,0/73
  27. Research on group signature,LiXin/Qingdao University,1/86
  28. On Fast Computation of Bilinear Pairings,SuZhiTu/Xi'an University of Electronic Science and Technology,1/164
  29. Research on Some Issues in Authenticated Key Agreement Protocols,NiLiang/Shanghai Jiaotong University,1/248
  30. Design of a Deniable Source Authentication Protocol for Multicast and Its Application,CuiMin/Yunnan University,0/27
  31. Design and Analysis of Cryptographic Protocols from Bilinear Pairings,YangChen/Xi'an University of Electronic Science and Technology,1/263
  32. Applications of ID-Based Cryptography to Mobile Ad Hoc Network,ChenHuiZuo/Institute of Electronics,2/264
  33. Research on Some Digital Signatures with Additional Properties,XinXiangJun/Xi'an University of Electronic Science and Technology,4/304
  34. Study on Digital Signatures from Bilinear Pairing,ChengXiangGuo/Xi'an University of Electronic Science and Technology,7/656
  35. Research on the Authentication and Key Agreement for Heterogeneous Wireless Network Interworking,JiangJun/Shanghai Jiaotong University,10/767
  36. Study on Theory and Applications of Identity-Based Authentication Protocols,CaoXueFei/Xi'an University of Electronic Science and Technology,6/652
  37. Research on Payment Protocols for M-Learning Resources,FuXiong/Huazhong University of Science and Technology,0/636
  38. Study and Design of Universal Designated Verifier Signature Schemes,MingYang/Xi'an University of Electronic Science and Technology,5/156
  39. Research on Key Technologies for Password-Authenticated Key Exchange Protocols,LiuXiuMei/Northeastern University,3/206
  40. Secure Multicast Research Group Key Management Protocol,LiuGuangWei/Northeastern University,4/212
  41. Research on Cryptosystems and Key Agreement Protocols from Bilinear Pairings,WangShengBao/Shanghai Jiaotong University,3/396
  42. Research on ID-Based Signature,ZhouZuo/Shanghai Jiaotong University,3/345
  43. Proxy signature related research,MaGuiZuo/Hefei University of Technology,0/75
  44. Two Provable Secure ID-based Group Key Agreement Protocols,LiangJun/Chengdu University of Technology,0/73
  45. Key Management Schemes in Identity-based Cryptosystems,WangYongTao/West China University,0/250
  46. The Relevant Research on the Proxy Signature,WangYan/Shandong University,1/150
  47. Research on Proxy Signature Schemes,ZhouKeFu/Xi'an University of Technology,0/110
  48. Research on Some Proxy Signatures for Special Use,LiSuJuan/Nanjing Normal University,2/95
  49. ID-Based Blind Signatures Technology Research,LuJiaHuang/Hohai University,1/200
  50. Signcryption Design and Analysis,LiZuMeng/Xi'an University of Electronic Science and Technology,1/133

Total 2 Pages First Previous 1 2 Next Last

© 2012 www.DissertationTopic.Net  Mobile