About 32 item dissertation in line with Cryptographic protocols query results,the following is 1 to 50(Search took 0.091 seconds)
- Design and Analysis of Some Cryptographic Protocols on Matrices,WangLi/Shanghai University,0/32
- Universally Composable Cryptographic Protocols Theory and Applications,FengTao/Xi'an University of Electronic Science and Technology,7/263
- Computer communication network security protocol analysis,ZhangYuQing/Xi'an University of Electronic Science and Technology,16/626
- Study on Media Access Control and Authentication Protocols in IEEE 802.11 Wireless Networks,YangWeiDong/Xi'an University of Electronic Science and Technology,2/538
- Composable security of cryptographic protocols,ZhangJunWei/Xi'an University of Electronic Science and Technology,10/285
- Formal analysis of cryptographic protocols Study,WangQuanLai/PLA Information Engineering University,1/181
- Study on Security Protocols in Heterogeneous Wireless Networks,LiYaZuo/Xi'an University of Electronic Science and Technology,2/709
- Studies on Security Analysis of Cryptographic Protocols,YangYuanYuan/Xi'an University of Electronic Science and Technology,0/232
- Research on Planning Theory and Algorithm for Cryptographic Protocol Attacks,ZhouZhiYong/PLA Information Engineering University,0/98
- The Optimization and Design of the Hyperelliptic Curve Cryptography,ChenYuChun/Suzhou University,0/48
- Research on Secure Authentication Protocols,ZengLiJun/PLA Information Engineering University,1/111
- Research on Planning-based Automatic Verification Technology for Cryptographic Protocols,ZhaoYu/PLA Information Engineering University,1/33
- Analysis and Evaluation of Cryptographic Protocols Based on Timed Petri Nets,ZhangGuangSheng/Shandong University of Science and Technology,2/184
- Research on Formal Analysis of Three-party Cryptographic Protocols,ZhangTieGang/PLA Information Engineering University,1/72
- Research on Analysis and Design of Cryptographic Protocols Based on Generalized Strand Space Model,ZhangZuo/PLA Information Engineering University,0/71
- Research on the Techniques Based on Multi-set Rewriting for Analyzing the Secure Properties of Cryptographic Protocols,ZhangChang/PLA Information Engineering University,0/51
- Research on the Reliability of the Authentication Logic System,RongKun/PLA Information Engineering University,1/36
- Secure elliptic curve selection algorithm and its application,WangCaiMei/Yangzhou University,3/200
- String space analysis of security protocols,ZuoLingYing/University of Electronic Science and Technology,2/97
- The Design and Implement of the Elliptic Curve Cryptography Engine,WangGang/Suzhou University,0/136
- Research on Spi Calculus-Based Automatic Analyzing Technology of Cryptographic Protocols,YuanLin/PLA Information Engineering University,2/91
- Logical Improvement and certain security analysis of cryptographic protocols,YuanYaFei/PLA Information Engineering University,1/66
- Key management protocol for secure group communication,ZuoZuo/Heilongjiang University,0/157
- The Analysis of Cryptographic Protocols Based on Petri Nets,DongWei/Shandong University of Science and Technology,1/215
- Research on Checking Security Protocols Technology Based on CPN Models,WuRuiLong/Guangxi University,3/218
- The Research of Formal Verification Method on Cryptography Protocol,LongJun/National University of Defense Science and Technology,0/148
- THE LOGIC ANALYSIS AND RESEARCH OF ELECTRONIC COMMERCE PROTOCOL,HeCheng/Xi'an University of Technology,0/127
- Cryptographic protocol analysis method of calculation symbol Reliability,ZhuYuNa/PLA Information Engineering University,1/41
- Research on Rational Cryptographic Protocols and Its Application,DuHeng/Shanghai Jiaotong University,2/101
- Study on Special Secure Multi-Party Computation Protocols,ZhaoWenJie/West China University,1/50
- Research on Proxy Electronic Voting Protocol,BaiErFei/East China Jiaotong University,0/21
- The Algorithm’s Security Research of the Cryptography,ZhangZuoYan/Liaoning Normal University,1/76
Total 1 Pages First Previous 1 Next Last
© 2012 www.DissertationTopic.Net Mobile
|