About 52 item dissertation in line with Internet security query results,the following is 1 to 50(Search took 0.086 seconds)
- The Application of Client Puzzle and Trust Mechanisms in the Mobile Internet,RaoDaHeng/Ningbo University,0/0
- China-Unicom CA Application Research of Electronic Authentication System,FuShuPing/Nanjing University of Posts and Telecommunications,0/23
- Internet Security under the Background of Informatization Management Research,TangZuo/Central South University,0/42
- Design and Implementation of Mobile Internet Content Security Audit System,JinZuoLei/Beijing Jiaotong University,0/66
- Realization of Image Encryption Using DES and MD5,WISAM HAMIDAH/Hunan University,0/2
- The Research of the Core Competitiveness of Online Banking in Commercial Bank of China,TuChunQiu/Jiangxi Normal University,0/4
- A Novell Security Framework for Web Application and Database,Sedeka Mahmoud Hamdy El Shamy/Hunan University,0/11
- Research on the Model for Correlation Analysis and Influence Evaluation of Network Security Event,YinZuo/Harbin Institute of Technology,0/2
- Research on Single-packet IP Traceback and Reactive Packet Filtering Techniques,LuNing/Beijing University of Posts and Telecommunications,0/5
- Research on the Security Situation and Countermeasure Based on Changchun Internet,DingYu/Jilin University,0/44
- A Study on the Stratagem of Security Management about the Next Generation’s Internet Based on IPV6,SongZuo/Jiangxi Agricultural University,,0/83
- Design and Implementation of Application Security Managerment Software Base on Android Platform,YuanGang/Beijing University of Posts and Telecommunications,0/590
- Research on Attack Source Traceback in Distributed Denial-of-Service Attacks,JingYiZuo/Fudan University,11/597
- A number of theoretical studies of the Internet network security and secure Web system design and implementation,WeiWei/Institute of Computing Technology,2/664
- Design and Analysis of Information Security and Micropayment Protocols for Internet,JiDongYao/Xi'an University of Electronic Science and Technology,6/363
- Research on Model-based Network Security Risk Assessment,XiaoXiaoChun/Fudan University,2/963
- Research of Security Key Technology for Clustered Tactical Internet,WangHengJun/PLA Information Engineering University,0/135
- The Analysis and Design of Firewall for Tactical Internet,LiuMingYu/National University of Defense Science and Technology,0/118
- The Design and Key Technologies of Tactical Internet,XiaGang/National University of Defense Science and Technology,2/573
- Study on Management of Internet Security,ZhuFeng/Nanchang University,2/188
- Research on the Application of PKI to the Internet,DengTao/National University of Defense Science and Technology,1/75
- ARP Attack and Defence in Public Internet Community,JinTao/Shanghai Jiaotong University,4/652
- The Study of The iSCSI Storage System’s Safety Performance,ZhuKe/Shanghai Jiaotong University,1/115
- Structure Analysis and Related Techniques Study on Network Worms,LiHaiTao/Beijing University of Posts and Telecommunications,1/208
- Risk and Precaution under Networking Environment,QiZhongWei/Jinan University,2/728
- The Application of Information Flow Optimization in E-business,ChenYao/Jilin University,2/315
- On the Restructure of Internet Security Administration Mode: Virtual Community Policing,ChenLong/Zhejiang University,1/483
- Research and Implementation of IPsec under Wireless Network Scenarios,ZhangChaoWei/Beijing Jiaotong University,3/110
- Study on Intelligent Intrusion Detection System Based on Fuzzy Estimation,ZhangGuangYun/Nanjing University of Technology,0/129
- The Research and Deployment of the Security Mechanisms of DNSSEC,ChengHongBo/Shanghai Jiaotong University,4/222
- A Design of Safely Anonymous Communication,TangSong/Hunan University,0/168
- Research about TTP of Non-repudiation Protocols,RenYanLi/Shaanxi Normal University,1/63
- The Study of Security Based on IPSec VPN,LuGuoDong/East China Normal University,1/156
- Research on the Security of Brand Automobile Network Trading Based on Fair Exchange Protocol,ZhangJiaMing/Wuhan University of Technology,0/106
- Several issues on computer crime,DongXueHua/East China University of Politics and Law,0/223
- A Study of Internet Security Based on Public-Key Infrastructure (PKI),FanZuo/Central China Normal University,3/197
- Internet Security Mechanism Based on Dynamic Path Identification,DuXiaoXue/Harbin Engineering University,2/40
- S Telecom Internet security risk assessment study,HuangYao/University of Electronic Science and Technology,3/85
- Defense research and implementation of a distributed denial of service attacks,WangLiJuan/University of Electronic Science and Technology,2/114
- Marketing Analyse of Internet Security Services on China Tietong Telecom Corporation,ZhangWei/Beijing Jiaotong University,0/54
- Design and Research of Security Event Analysis Platform Based on Data Mining Technoledge,PanFeng/Chengdu University of Technology,1/143
- On Our Internet Securities Trading and Perfection of It’s Legal System,LiFang/China University of Political Science,1/178
- The Design and Realization of Embedded Application System Security System,HuangJinLian/Tianjin University,0/60
- P2P Botnet Detection in Small and Medium LAN,ZhouHaiTao/Donghua University,0/57
- Network Security Design and Implementation of TCT Corporation,MaPingTao/Dalian Maritime University,0/56
- The Research and Implementation of Captcha Recognition System,WangXiaoPeng/South China University of Technology,2/302
- Telecom operators IP Internet Security Services Research,ZhouZuoJie/Beijing University of Posts and Telecommunications,1/10
- The Plan, Design and Construction of Digital Campus,WangDeFeng/Inner Mongolia University,0/134
- The Research and Designation of Library Network Architecture, Network Platform and Application Security of the College,YangMing/Nanchang University,1/113
- Design and Implementation of Credit Management System for Rural Credit Cooperatives,ZhangZhiJie/Northeastern University,0/122
Total 2 Pages First Previous 1 2 Next Last
© 2012 www.DissertationTopic.Net Mobile
|