About 121 item dissertation in line with Formal Analysis query results,the following is 1 to 50(Search took 0.086 seconds)
- Examples of Overseas Research Prospective for Chinese Fine Art History,LiuXiaoJie/Central China Normal University,0/0
- The Formal Analysis of J.C. Ransom's Poetry Theory,TanShanShan/Xiangtan University,0/30
- SysML-based Modeling and Analysis for CTCS-3Train Control System,HeLiZuo/Beijing Jiaotong University,0/11
- Formal Analysis Methods of Security Protocols Based on Strand Space Model and its Application,JieYanMing/Hubei Normal University,,0/22
- Reserch on Security Protocol Based on Strand Space Theory,ZuoLiLi/Southwest Jiaotong University,0/115
- Analvsis and Development on Formal Method of Secruity Protocol Based on Strand Space Model,DongXueWen/Xi'an University of Electronic Science and Technology,1/51
- Design and Formal Analysis of TPM-based Protocols for IaaS and SaaS,CuiWei/PLA Information Engineering University,0/63
- A Method for Analyzing Electronic Commerce Protocols Based on Knowledge and Faith Model,WeiGang/Yanshan University,0/19
- A Combining Deterministic Finite Automaton with Logic Rules Approach for Analyzing of E-commerce Protocol,MaSheng/Yanshan University,0/16
- Formal Verification of Security Protocols Implementation by Java,WangWei/Central South University for Nationalities,0/29
- Research of Analyzing E-commerce Protocols Based on Colored Petri Nets,LuBei/Yanshan University,0/34
- Research on the Roaming Authentication Protocol of the Mobile Network in the Formalization Way,WengYanQin/Hubei Normal University,,0/25
- The Research of Mobile Payment Security Protocols Based on Public Key Cryptosystem,LiuLiang/Southwest Jiaotong University,0/59
- The Research of Mobile Payment Security Protocols Based on Symmetric Cryptosystem,GaoBaoSheng/Southwest Jiaotong University,1/224
- Research and Design for Security Protocols of the Internet of Things Electronic Tags,XiaoFeng/Beijing University of Posts and Telecommunications,0/11
- Wide Area Travelling Wave Fault Location Algorithm and Its Formal Verification,ChenYu/Shanghai Jiaotong University,0/141
- The Formal Analysis Methods of Wireless Network Security Protocol,ZhangFan/Xi'an University of Electronic Science and Technology,16/749
- Security protocols and its BAN logic analysis,YangShiPing/Guizhou University,6/450
- The Strand Spaces Theory and Its Application to the Analysis of Security Protocols,LongShiGong/Guizhou University,3/375
- The Application Study on Formalism and Model Checking Techniques of Electronic Commerce Protocols,WenJingHua/Guizhou University,2/502
- Research on Analysis of Fair Exchange Protocols,XingYuHong/Shandong University,5/229
- Research on Commercial Security Policy and Its Formal Analysis,WenHongZi/Institute of Software,6/252
- Security protocol analysis theory and method,FanHong/PLA Information Engineering University,14/578
- Design and analysis of threshold signature scheme and authentication protocols,WangGuiLin/Institute of Software, Chinese Academy of Sciences,8/487
- On Some Key Problems of Mobile Payment System Security,LiuWenZuo/Dalian University of Technology,10/1197
- The Research and Application of Formalized Methods of Multi-party Security Protocols Analysis,WangXueMing/Guizhou University,4/346
- Formal Analysis and Design of Wireless Network Protocols,YangChao/Xi'an University of Electronic Science and Technology,10/845
- Research on Formal Verification Methods of Security Protocols,ShiShuDong/Huazhong University of Science and Technology,5/297
- Formal analysis of cryptographic protocols Study,WangQuanLai/PLA Information Engineering University,1/181
- Studies on Security Analysis of Cryptographic Protocols,YangYuanYuan/Xi'an University of Electronic Science and Technology,0/232
- Study on Key Technologies of Formal Analysis Method of Security Protocols,XieHongBo/University of Electronic Science and Technology,0/160
- Generalized Quantifier Theory Research,ZhangShiNing/Nankai University,0/278
- Design and Analysis of Security Authentication Protocols,WangHuiBin/PLA Information Engineering University,1/299
- Research on Formal Security Protocol Analysis Technology,ZhaoHui/Dalian University of Technology,0/225
- Research on Formal Analysis Method of the Security of E-commerce Protocol,LiYunFeng/Southwest Jiaotong University,1/333
- Astudy on Xiao Gang’s Pian Ti Wen,MouHuaLin/Sichuan Normal University,2/138
- Research on the Security of Space Communication Protocols,FeiXiaoFei/PLA Information Engineering University,0/298
- Research on a New Authentication Protocol WCAP for Wireless Communication Network Based on WiMAX,LiRuiXue/Jilin University,0/97
- Research and Design of Secure Embedded Operating System Face to Power,MaXiangShun/Jiangsu University,1/82
- The Formal Analysis and Control to Security Protocol of Telecommunication for Electric Power System,ChengMinYing/Guangdong University of Technology,0/64
- Research on Verification Technology for Non-Repudiation and Fairness of Cryptographic Protocols,FanZuoDan/PLA Information Engineering University,0/43
- Research on WAP Based Protocol Framework for Mobile Commerce Secure Payment,SongShanShan/Donghua University,1/362
- 3G security enhancements research and authentication and key agreement protocol design,BianRuiZhao/PLA Information Engineering University,4/316
- The Extension and Application of Strand Space,ChenLiQiong/Shanghai Jiaotong University,1/82
- Research on Combination of Formal Analysis Methods to Security Protocols,HuLei/Nanchang University,0/122
- Formal Analysis for Electronic Commerce Protocols,WangBing/Nanchang University,1/126
- An Authentication Protocol for OSGi Based on Hybrid Encryption,LiJiaHua/Dalian University of Technology,0/88
- The Analysis and Research on Secure Mobile Commerce Protocol,LiWenJuan/Dalian University of Technology,0/189
- The Analysis of Security Protocols Based on Colored Petri Nets,HanZuo/Shandong University of Science and Technology,0/167
- Automatic Verifying Security Protocols Basing Term Guessing and Hash Forging,WuYan/Nanjing University of Aeronautics and Astronautics,0/34
Total 3 Pages First Previous 1 2 3 Next Last
© 2012 www.DissertationTopic.Net Mobile
|