About 22 item dissertation in line with Cryptographic protocol query results,the following is 1 to 50(Search took 0.065 seconds)

  1. The design of identity authentication protocol and its applications,LiYunLian/Hunan University,0/25
  2. Research and Design on Identity Authentication Protocol for Multi-environments,LiXiong/Beijing University of Posts and Telecommunications,2/619
  3. Research and Design of Confidential Carriers Management System Based on RFID,ShangKai/Lanzhou University of Technology,1/77
  4. Distributed Cryptographic Protocol and Fairness,TianYouLiang/Xi'an University of Electronic Science and Technology,0/96
  5. The Security Analysis of Quantum Cryptography Protocols,ChangZhengGang/PLA Information Engineering University,0/73
  6. Design and Analysis of Cryptographic Protocols from Bilinear Pairings,YangChen/Xi'an University of Electronic Science and Technology,1/263
  7. The Petri Net Based on the π-calculus and the Formal Analysis for Cryptographic Protocols,CaoMuLiang/Shanghai Jiaotong University,1/401
  8. Security Analysis of Trusted Platform Module and Application,ChenJun/Institute of Computing Technology,30/1161
  9. Logic security analysis of cryptographic protocols - A New BAN-like logic,LiYiFa/PLA Information Engineering University,12/223
  10. Analysis and Design of Authenticated Key Agreement Protocols,ZhaoJianJie/Shanghai Jiaotong University,0/120
  11. Analysis and Design of Password Authenticated Key Exchange Protocols in the Standard Model,HuXueXian/PLA Information Engineering University,3/108
  12. Cryptographic Protocol Engineering Andprotocol Security Based on Trusted Freshness,DongLing/Shanghai Jiaotong University,0/81
  13. Design and Analysis of Cryptographic Protocols for RFID,PeiYouLin/Hefei University of Technology,12/655
  14. The Automatic Analysis System for Network Authentication Protocols,LiJing/Nanchang University,1/147
  15. Research on Formal Analysis of Security Protocol of Computer Communication Network,LiuXiuYing/Xi'an University of Electronic Science and Technology,2/236
  16. The Analysis of Protocols Based on Petri Nets,YangYongQiang/Shandong University of Science and Technology,1/343
  17. Study on Algebraic Model of Cryptographic Protocols and Algorithm of Security Analysis,WangYongBao/Beijing University of Posts and Telecommunications,1/75
  18. Network Security Technology Research and Application Based IPSEC,ZhangJian/Hohai University,2/195
  19. Research of Elliptic Curve Cryptosystem Based on ONB and Implementation of IP Core,LiNing/Xi'an University of Electronic Science and Technology,1/90
  20. The Research and Application of Hyperelliptic Curve Cryptographic Protocol,YeZhiYong/Suzhou University,0/66
  21. Application of Petri Nets in Modelling and Analyzing of Encryption Protocol,LiYuDong/Shandong University of Science and Technology,0/25
  22. Research and Implementation of the Platform of Unified Authentication and Authorization in Education Information Network,WangXia/PLA Information Engineering University,0/25

Total 1 Pages First Previous 1 Next Last

© 2012 www.DissertationTopic.Net  Mobile