Dissertation 

About 946 item dissertation in line with Cryptography query results,the following is 1 to 50(Search took 0.080 seconds)

  1. Design and Research of the Anti-counterfeiting System Based on RFID,LiuYuanQing/South China University of Technology,0/37
  2. Research of Anti-collision Algorithm and Security Protocol in RFID Systems,XiaoFeng/Beijing Institute of Technology,0/69
  3. Self-service Banking System Design and Application,MiaoZuo/Tianjin University,0/3
  4. Design and Implementation of Network Learning Platform Based on B/S,HaLiYuan/Jilin University,0/33
  5. LBH-based Optimal Authenticated Data Structure Model and Application,LiFuXiang/Northeastern University,0/2
  6. Research on the Image Secret Sharing Methods,LiPeng/Harbin Institute of Technology,0/95
  7. Based on the Theory of Chaos Encryption Algorithm,HuangGe/Central South University,0/7
  8. Big Data Encryption Algorithm Based on Data Deduplication Technology,WangMengMeng/North China University of Water Resources and Electric Power,0/344
  9. Research of Encryption Algorithm on Digital Image Based on Chaotic Theory and Optimal Design of the System,ChenZuo/Henan University of Science and Technology,0/3
  10. Study on Chaotic Digital Image Encryption,WangJing/Nanjing University of Posts and Telecommunications,0/246
  11. Research on Elliptic Curve Cryptography Algorithm in Residue Number System,LiuYanHua/Tianjin University,0/1
  12. Design for Unified Architecture ECC and RSA Cryptographic Processor,LiuBing/Tianjin University,0/1
  13. Research on Identity-Based Signature Scheme in the Standard Model,GuKe/Central South University,0/158
  14. An Research on RSA-Based Probabilistic Public Key Encryption Scheme,LiZuoQi/Central South University,0/12
  15. No studies certificate signcryption scheme,LiHuiGe/Shaanxi Normal University,0/13
  16. Research and design on proxy signature scheme,YangLi/Shaanxi Normal University,0/37
  17. Research on Key Management for Wireless Sensor Network Based on Clustering,ZhouLing/Central South University,0/13
  18. The Research About Algorithm of Point Plus and Double Point on Elliptic Curve,SongChunYu/Northwest University for Nationalities,0/16
  19. An Electronic Voting Scheme Based on Fully Homomorphism Encryption,ZhuZhengYang/Guangzhou University,0/54
  20. Research on threshold signature,XieJunQin/Shaanxi Normal University,0/33
  21. Monotone span programs of study and its application based on secret sharing scheme,HeiZan/Shaanxi Normal University,0/17
  22. Research on Some Elliptic Curve Cryptographic Algorithms,YuWei/University of Science and Technology of China,0/85
  23. Study on the Sanitizable Digital Signature Scheme,LiRui/Chang'an University,0/3
  24. Research on Encryption Scheme Based on DNA Computing,ZhaoXiaoHang/Zhengzhou Institute of Light Industry,0/6
  25. Application Research in the DNA Code to Calculate DNA,XuSuMei/Anhui University of Technology,0/6
  26. Digital Image Encryption Based on GPGPU,WenWanLi/Hangzhou University of Electronic Science and Technology,0/1
  27. DNA Password System Based on DNA Computing,JiangJun/Anhui University of Technology,0/24
  28. Based on the Pollution of the Chaotic Sequence Password and Hash Function Research,LiZhanMei/Dalian University,0/0
  29. Research of Based on CL-PKC and ACO Routing Protocol in Wireless Sensor Networks,ZhangZuo/Guangdong University of Technology,0/13
  30. Analysis and Desigin of the E-voting Protocol in Campus Network,WangJiaFeng/Anhui University,0/32
  31. Security Regarding Internet Banking,TRAN VAN THUY/Hunan University,0/9
  32. Research on3G-WLAN Interworking Security from Certificateless Public Key Cryptography,CuiFang/Xi'an University of Electronic Science and Technology,0/47
  33. Design and implementation of security solution of massively multiplayer online game,WanHongBo/Fudan University,0/51
  34. A Protection System of Electronic Document Security Based on TCM and CPK,SuXiaoLong/Beijing Jiaotong University,1/44
  35. Design of Network Files Encryption System Based on RSA Fast Encryption Algorithm,LuXiuHui/University of North,0/186
  36. Design of Password-based Authenticated Key Agreement Protocols,TangHongBin/University of Electronic Science and Technology,0/285
  37. Research on Data Provenance’s Security Model,YanZuoZuo/Shandong University of Technology,1/191
  38. Research on Security Inter-domain Routing Protocol Based on Behavior and Identity Trust,KangZhiRong/Xi'an University of Electronic Science and Technology,0/34
  39. Research and Implementation on Public-Key Based RFID Authentication Technology,ChenZhiYi/Xi'an University of Electronic Science and Technology,1/99
  40. Research on Security Protocols for RFID Systems,ZhouJingXian/Beijing University of Posts and Telecommunications,0/46
  41. Research on the Dynamic Security Management Mechanism for Real-time Embedded System,MaYue/University of Electronic Science and Technology,0/5
  42. The Design and Implementation of Shopping System Foreground and Its Security,ZengYan/Beijing University of Technology,0/2
  43. Research of Reconfigurable Techniques for Modular Multiplier in Galois Field,YangTongJie/PLA Information Engineering University,1/38
  44. The Research of Trust Cryptography Module Based on Openrisc,CaoHuiYuan/PLA Information Engineering University,0/34
  45. Design and Implementation Research of Cryptographic Chip Operating System,ZhengBin/PLA Information Engineering University,2/23
  46. An Encryption Algorithm and Implementation for High-resolution Digital Images Based on Chaos System,HaoLei/Shandong Institute of Architecture,0/83
  47. Image Encryption based on chaotic systems,ChenMeng/Central South University,0/41
  48. Study on Fragile Image Watermarking Based on Public Key Cryptography and Hash Function,TaoLi/Southwest Jiaotong University,0/29
  49. Research of Visual Cryptography Scheme Based on Group Structure,ShiLin/PLA Information Engineering University,0/13
  50. The Least Significant Bit of the Digital Watermarking Algorithm Against Geometric Attacks,BaiDongHui/Taiyuan University of Technology,0/1

Total 19 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last

© 2012 www.DissertationTopic.Net  Mobile