About 32 item dissertation in line with Cryptographic protocols query results,the following is 1 to 50(Search took 0.091 seconds)

  1. Design and Analysis of Some Cryptographic Protocols on Matrices,WangLi/Shanghai University,0/32
  2. Universally Composable Cryptographic Protocols Theory and Applications,FengTao/Xi'an University of Electronic Science and Technology,7/263
  3. Computer communication network security protocol analysis,ZhangYuQing/Xi'an University of Electronic Science and Technology,16/626
  4. Study on Media Access Control and Authentication Protocols in IEEE 802.11 Wireless Networks,YangWeiDong/Xi'an University of Electronic Science and Technology,2/538
  5. Composable security of cryptographic protocols,ZhangJunWei/Xi'an University of Electronic Science and Technology,10/285
  6. Formal analysis of cryptographic protocols Study,WangQuanLai/PLA Information Engineering University,1/181
  7. Study on Security Protocols in Heterogeneous Wireless Networks,LiYaZuo/Xi'an University of Electronic Science and Technology,2/709
  8. Studies on Security Analysis of Cryptographic Protocols,YangYuanYuan/Xi'an University of Electronic Science and Technology,0/232
  9. Research on Planning Theory and Algorithm for Cryptographic Protocol Attacks,ZhouZhiYong/PLA Information Engineering University,0/98
  10. The Optimization and Design of the Hyperelliptic Curve Cryptography,ChenYuChun/Suzhou University,0/48
  11. Research on Secure Authentication Protocols,ZengLiJun/PLA Information Engineering University,1/111
  12. Research on Planning-based Automatic Verification Technology for Cryptographic Protocols,ZhaoYu/PLA Information Engineering University,1/33
  13. Analysis and Evaluation of Cryptographic Protocols Based on Timed Petri Nets,ZhangGuangSheng/Shandong University of Science and Technology,2/184
  14. Research on Formal Analysis of Three-party Cryptographic Protocols,ZhangTieGang/PLA Information Engineering University,1/72
  15. Research on Analysis and Design of Cryptographic Protocols Based on Generalized Strand Space Model,ZhangZuo/PLA Information Engineering University,0/71
  16. Research on the Techniques Based on Multi-set Rewriting for Analyzing the Secure Properties of Cryptographic Protocols,ZhangChang/PLA Information Engineering University,0/51
  17. Research on the Reliability of the Authentication Logic System,RongKun/PLA Information Engineering University,1/36
  18. Secure elliptic curve selection algorithm and its application,WangCaiMei/Yangzhou University,3/200
  19. String space analysis of security protocols,ZuoLingYing/University of Electronic Science and Technology,2/97
  20. The Design and Implement of the Elliptic Curve Cryptography Engine,WangGang/Suzhou University,0/136
  21. Research on Spi Calculus-Based Automatic Analyzing Technology of Cryptographic Protocols,YuanLin/PLA Information Engineering University,2/91
  22. Logical Improvement and certain security analysis of cryptographic protocols,YuanYaFei/PLA Information Engineering University,1/66
  23. Key management protocol for secure group communication,ZuoZuo/Heilongjiang University,0/157
  24. The Analysis of Cryptographic Protocols Based on Petri Nets,DongWei/Shandong University of Science and Technology,1/215
  25. Research on Checking Security Protocols Technology Based on CPN Models,WuRuiLong/Guangxi University,3/218
  26. The Research of Formal Verification Method on Cryptography Protocol,LongJun/National University of Defense Science and Technology,0/148
  28. Cryptographic protocol analysis method of calculation symbol Reliability,ZhuYuNa/PLA Information Engineering University,1/41
  29. Research on Rational Cryptographic Protocols and Its Application,DuHeng/Shanghai Jiaotong University,2/101
  30. Study on Special Secure Multi-Party Computation Protocols,ZhaoWenJie/West China University,1/50
  31. Research on Proxy Electronic Voting Protocol,BaiErFei/East China Jiaotong University,0/21
  32. The Algorithm’s Security Research of the Cryptography,ZhangZuoYan/Liaoning Normal University,1/76

Total 1 Pages First Previous 1 Next Last

© 2012 www.DissertationTopic.Net  Mobile