Dissertation 

About 52 item dissertation in line with Internet security query results,the following is 1 to 50(Search took 0.023 seconds)

  1. The Application of Client Puzzle and Trust Mechanisms in the Mobile Internet,RaoDaHeng/Ningbo University,0/0
  2. China-Unicom CA Application Research of Electronic Authentication System,FuShuPing/Nanjing University of Posts and Telecommunications,0/23
  3. Internet Security under the Background of Informatization Management Research,TangZuo/Central South University,0/42
  4. Design and Implementation of Mobile Internet Content Security Audit System,JinZuoLei/Beijing Jiaotong University,0/66
  5. Realization of Image Encryption Using DES and MD5,WISAM HAMIDAH/Hunan University,0/2
  6. The Research of the Core Competitiveness of Online Banking in Commercial Bank of China,TuChunQiu/Jiangxi Normal University,0/4
  7. A Novell Security Framework for Web Application and Database,Sedeka Mahmoud Hamdy El Shamy/Hunan University,0/11
  8. Research on the Model for Correlation Analysis and Influence Evaluation of Network Security Event,YinZuo/Harbin Institute of Technology,0/2
  9. Research on Single-packet IP Traceback and Reactive Packet Filtering Techniques,LuNing/Beijing University of Posts and Telecommunications,0/5
  10. Research on the Security Situation and Countermeasure Based on Changchun Internet,DingYu/Jilin University,0/44
  11. A Study on the Stratagem of Security Management about the Next Generation’s Internet Based on IPV6,SongZuo/Jiangxi Agricultural University,,0/83
  12. Design and Implementation of Application Security Managerment Software Base on Android Platform,YuanGang/Beijing University of Posts and Telecommunications,0/590
  13. Research on Attack Source Traceback in Distributed Denial-of-Service Attacks,JingYiZuo/Fudan University,11/597
  14. A number of theoretical studies of the Internet network security and secure Web system design and implementation,WeiWei/Institute of Computing Technology,2/664
  15. Design and Analysis of Information Security and Micropayment Protocols for Internet,JiDongYao/Xi'an University of Electronic Science and Technology,6/363
  16. Research on Model-based Network Security Risk Assessment,XiaoXiaoChun/Fudan University,2/963
  17. Research of Security Key Technology for Clustered Tactical Internet,WangHengJun/PLA Information Engineering University,0/135
  18. The Analysis and Design of Firewall for Tactical Internet,LiuMingYu/National University of Defense Science and Technology,0/118
  19. The Design and Key Technologies of Tactical Internet,XiaGang/National University of Defense Science and Technology,2/573
  20. Study on Management of Internet Security,ZhuFeng/Nanchang University,2/188
  21. Research on the Application of PKI to the Internet,DengTao/National University of Defense Science and Technology,1/75
  22. ARP Attack and Defence in Public Internet Community,JinTao/Shanghai Jiaotong University,4/652
  23. The Study of The iSCSI Storage System’s Safety Performance,ZhuKe/Shanghai Jiaotong University,1/115
  24. Structure Analysis and Related Techniques Study on Network Worms,LiHaiTao/Beijing University of Posts and Telecommunications,1/208
  25. Risk and Precaution under Networking Environment,QiZhongWei/Jinan University,2/728
  26. The Application of Information Flow Optimization in E-business,ChenYao/Jilin University,2/315
  27. On the Restructure of Internet Security Administration Mode: Virtual Community Policing,ChenLong/Zhejiang University,1/483
  28. Research and Implementation of IPsec under Wireless Network Scenarios,ZhangChaoWei/Beijing Jiaotong University,3/110
  29. Study on Intelligent Intrusion Detection System Based on Fuzzy Estimation,ZhangGuangYun/Nanjing University of Technology,0/129
  30. The Research and Deployment of the Security Mechanisms of DNSSEC,ChengHongBo/Shanghai Jiaotong University,4/222
  31. A Design of Safely Anonymous Communication,TangSong/Hunan University,0/168
  32. Research about TTP of Non-repudiation Protocols,RenYanLi/Shaanxi Normal University,1/63
  33. The Study of Security Based on IPSec VPN,LuGuoDong/East China Normal University,1/156
  34. Research on the Security of Brand Automobile Network Trading Based on Fair Exchange Protocol,ZhangJiaMing/Wuhan University of Technology,0/106
  35. Several issues on computer crime,DongXueHua/East China University of Politics and Law,0/223
  36. A Study of Internet Security Based on Public-Key Infrastructure (PKI),FanZuo/Central China Normal University,3/197
  37. Internet Security Mechanism Based on Dynamic Path Identification,DuXiaoXue/Harbin Engineering University,2/40
  38. S Telecom Internet security risk assessment study,HuangYao/University of Electronic Science and Technology,3/85
  39. Defense research and implementation of a distributed denial of service attacks,WangLiJuan/University of Electronic Science and Technology,2/114
  40. Marketing Analyse of Internet Security Services on China Tietong Telecom Corporation,ZhangWei/Beijing Jiaotong University,0/54
  41. Design and Research of Security Event Analysis Platform Based on Data Mining Technoledge,PanFeng/Chengdu University of Technology,1/143
  42. On Our Internet Securities Trading and Perfection of It’s Legal System,LiFang/China University of Political Science,1/178
  43. The Design and Realization of Embedded Application System Security System,HuangJinLian/Tianjin University,0/60
  44. P2P Botnet Detection in Small and Medium LAN,ZhouHaiTao/Donghua University,0/57
  45. Network Security Design and Implementation of TCT Corporation,MaPingTao/Dalian Maritime University,0/56
  46. The Research and Implementation of Captcha Recognition System,WangXiaoPeng/South China University of Technology,2/302
  47. Telecom operators IP Internet Security Services Research,ZhouZuoJie/Beijing University of Posts and Telecommunications,1/10
  48. The Plan, Design and Construction of Digital Campus,WangDeFeng/Inner Mongolia University,0/134
  49. The Research and Designation of Library Network Architecture, Network Platform and Application Security of the College,YangMing/Nanchang University,1/113
  50. Design and Implementation of Credit Management System for Rural Credit Cooperatives,ZhangZhiJie/Northeastern University,0/122

Total 2 Pages First Previous 1 2 Next Last

© 2012 www.DissertationTopic.Net  Mobile