About 92 item dissertation in line with Intrusion Tolerance query results,the following is 1 to 50(Search took 0.013 seconds)

  1. Research on Dynamic Recovery Technology Based on Application Semantics,TongWei/Huazhong University of Science and Technology,0/1
  2. The Design and Realization of Agricultural Products Trading System,ZhuJiaXiong/University of Electronic Science and Technology,0/40
  3. Research of Intrusion Tolerance Systems Based on Virtualized Recovery,AiQing/East China University of Science and Technology,0/16
  4. Research on Model and Evaluation Strategy of Autonomic Intrusion Tolerance,LiuBin/Henan University of Science and Technology,0/27
  5. Research of Certificate Revocation Mechanism Based on Intrusion Tolerance Technology,LvHongWei/,0/28
  6. Research on Virtualization Intrusion Tolerance Based on Cloud Computing,LuoDengLiang/Inner Mongolia University of Science and Technology,0/98
  7. Research on Intrusion Tolerance Base on Byzantine Algorithm under Cloud Computing,WangXiuPing/Inner Mongolia University of Science and Technology,0/31
  8. Research on Authentication Architecture and Related Technologies of Wireless Networks,GuoPing/Nanjing University of Technology and Engineering,0/224
  9. Research on Fault Tolerance Mechanism Based on Clustering in Wireless Sensor Networks,ZuoHongYan/Suzhou University,0/7
  10. Research on Key Techniques of Intrusion Tolerance under Resource-Constrained Scenarios,ZengYong/Xi'an University of Electronic Science and Technology,2/134
  11. Research on Theory and Applications of Production Information Integration in Power Enterprises,TaoJia/Zhejiang University,1/919
  12. Algorithms of Sequence Analysis and Theirs Applications in Intrusion Tolerance,ZhaoFeng/Huazhong University of Science and Technology,0/374
  13. Research on Some Key Problems of Initiative Intrusion Tolerance Systems and Self-regeneration Technologies,WangLiangMin/Xi'an University of Electronic Science and Technology,3/447
  14. Theory and Approaches for Intrusion Tolerance,ShiTingJun/Xi'an University of Electronic Science and Technology,1/435
  15. Theory and Methods of Intrusion Tolerance: Research and Applications,GuoYuanBo/Xi'an University of Electronic Science and Technology,9/490
  16. Research on Grid Computing Oriented On-demand Intrusion Detection Model and Key Technonogies,ChenRong/Zhejiang University,2/666
  17. Study on ECC Based Threshold Cryptography and Its Application--Usage in Intrusion Tolerance,ZhangXianFeng/University of Electronic Science and Technology,2/554
  18. Research on Secure PKI,JingJiWu/Institute of Electronics,9/499
  19. Security Analysis of Discrete Logarithm Based Cryptographic Schemes and Secure Implementation Technology,WangYuZhu/Chongqing University,0/174
  20. Research on Network Forensic Technology,ZhangYouDong/Nanjing University of Aeronautics and Astronautics,5/940
  21. Research on Intrusion Tolerance Database Technologies,XieMeiYi/Huazhong University of Science and Technology,0/188
  22. A Research on Security Technology of Wireless Sensor Network,WangWei/Taiyuan University of Technology,2/595
  23. Research on the Theory and Applied Technology of Network Intrusion Tolerance,QinHuaWang/Nanjing University of Technology and Engineering,1/301
  24. Research and Design of Web Server Intrusion-Tolerant System,NuErBuLi/Jilin University,0/133
  25. Application and Quantitative Analysis of Intrusion Tolerance Mechanism,QinHaiBo/Jilin University,0/37
  26. A transaction layer intrusion tolerant database design and implementation,ChuDaPeng/Jilin University,0/57
  27. Research on Intrusion Tolerant System and Its Key Techniques,LuZuoWen/East China Normal University,1/147
  28. Research on Intrusion Tolerance Recovery Strategy for Distributed Object System,ZhangZuo/Huazhong University of Science and Technology,0/52
  29. Research on Intrusion Tolerant Strategy for Web Applications,YaoJing/Huazhong University of Science and Technology,1/78
  30. Research and Application of Intrusion Tolerance Technology in Enterprise Information System,FengJingYing/Harbin University of Science and Technology,0/111
  31. Study and Implementation of Security Technology of Non-structured Data Center,ZhouJianFeng/Xi'an University of Electronic Science and Technology,0/79
  32. Intrusion Tolerance in CA,ChaiZhengYi/Zhengzhou University,0/78
  33. Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA,QinLingShu/Wuhan University of Technology,0/94
  34. Research on Intrusion Detection Technology Based on Database,LiWeiQiang/Central South University,5/166
  35. Application and Research of Resilient Function in Resilient Fault Tolerance,DaiZheng/Wuhan University,0/51
  36. The Design and Implementation of intrusion tolerant certification body,ZhouRuiHui/Institute of Software,0/125
  37. Research and Implementation of PKI Trust Model and Certificate Authority Based on Intrusion Tolerance,ZhangGuoLong/Daqing Petroleum Institute,0/113
  38. Collaborative Design System based on P2P secure communication platform for research and implementation,ChenZuo/Southeast University,0/209
  39. Research and Application of Intrusion-tolerance Technology in the Network Security of Power Enterprise,XuLuFeng/North China Electric Power University (Hebei),0/110
  40. The Research of Adaptive Reconfiguration Intrusion Tolerance System,ZhaoJiGang/Tianjin University,1/91
  41. Database security Monitoring System,LvJianHong/Northwestern Polytechnical University,0/207
  42. Study on Intruison Tolerance Database,HeLin/Xi'an University of Electronic Science and Technology,0/127
  43. The Research of an Intrusion Tolerant System Based on Code Access Control,GuTa/Nanjing University of Technology,0/96
  44. Research on Certificate Authority Private Key Protection,DuQiuLing/Beijing University of Technology,4/113
  45. The Research of Group Membership Protocol in Intrusion-Tolerant System,LiZhong/Harbin Institute of Technology,0/76
  46. Security Analysis of Intrusition Tolerance System Based on Petri Nets,DingWenBin/Harbin Institute of Technology,0/135
  47. Research and Implementation of DNS Security Platform,ZuoBoRu/Harbin Institute of Technology,7/412
  48. Transaction-level attack isolated database system design,YuChangHui/Shandong University,0/47
  49. The database intrusion tolerant multi-stage damage control model,LiWenCai/Shandong University,1/72
  50. Research and Design of Certificate Authority Based on Intrusion Tolerance,LiuKun/Guizhou University,0/114

Total 2 Pages First Previous 1 2 Next Last

© 2012 www.DissertationTopic.Net  Mobile