About 155 item dissertation in line with Key Exchange query results,the following is 1 to 50(Search took 0.080 seconds)

  1. Research and Implementation of Secure Voice Communication,YinManGang/Hangzhou University of Electronic Science and Technology,0/30
  2. Authenticated Key Exchange and Proof in eCK Model,TianJing/Northeastern University,0/1
  3. Research on Provably Secure Password Authentication Key Exchange Protocol,YangHan/China University of Mining and Technology,0/17
  4. Research and Design of Password-based Mutual Authentication Key Agreement Scheme with Smart Card,WangZuo/Shenyang Normal,0/5
  5. Design and Security Proof of Multi-Factor Authenticated Key Exchange Protocols,LiuYing/PLA Information Engineering University,0/20
  6. Research on Authenticated Key Exchange Protocol Based on Diffie-Hellman Method,YangZengFu/Zhengzhou University,0/59
  7. Research on Interactive Security Protocol Analysis Based-on Uinversal Composable,QiQingLei/Henan University of Technology,0/14
  8. Design and Security Analysis of Anonymous Authenticated Key Exchange Protocols,LiuCong/PLA Information Engineering University,0/34
  9. Security Alliance’s Design and Application Based on IPSec Protocol,XiaoBo/Chongqing University,0/0
  10. Research of Key Exchange and Encrypted Authentication on the Network Card,WangDongHong/Northeast Forestry University,0/43
  11. Design and Analysis of Attribute Based Authenticated Key Exchange Protocols,WeiJiangHong/PLA Information Engineering University,0/49
  12. Research and implementation of security technology in network space,LinWei/University of Electronic Science and Technology,0/93
  13. The security analysis and verification of the IPv6 protocol,GuoLinLin/University of Electronic Science and Technology,0/126
  14. An Access Control Model for Cloud Computing Based on T-RBAC Model and Three-party Key Exchange Protocol,WangXiaoWei/Fudan University,0/145
  15. The Research and Application of IPSec VPN Based on Digital Certificate,ChaiGuoJie/Shandong University,0/209
  16. Analysis and design of security protocols based on Cloud Computing,HeXiaoHu/University of Electronic Science and Technology,1/228
  17. File Transparent Encryption System Based on Xen,WangZuo/Beijing University of Posts and Telecommunications,2/106
  18. Research on Identity Based Cryptosystem,WangZuo/Shandong University,1/638
  19. Research of ZigBee Multi-level Routing Algorithms and Security Mechanisms,ZhangMinPeng/Guangdong University of Technology,0/66
  20. Research on Provably Security of Authenticated Key Exchange Protocols,YuBing/Northeastern University,0/33
  21. Research on Password-based Authenticated Key Exchange Protocols and Associated Encryption Algorithms from Lattices,YeMao/PLA Information Engineering University,0/2
  22. Analytical Improvement and Implementation for Internet Key Exchange Protocol,XieZuoRen/Lanzhou University,0/10
  23. The Security Definition and Analysis of Fixed SE-KE Protocol,HuLang/Fudan University,0/19
  24. Research on Attribute Based Cryptographic Algorithms,LiuJian/University of Electronic Science and Technology,0/34
  25. Security Study on Cloud Computing Based Mobile Application Model,XiongYuCong/Beijing Jiaotong University,0/225
  26. Design and Analysis of Provably Secure Authentication and Key Exchange Protocols,CaoChunJie/Xi'an University of Electronic Science and Technology,10/682
  27. Ergodic Matrices and Its Applications in Public Key Cryptography,PeiShiHui/Jilin University,4/226
  28. Public wireless LAN security system can experience the formalization of security analysis,SongYuBo/Southeast University,1/395
  29. Study of Authentication and Key Agreement Protocols in Wireless Networks,LiXingHua/Xi'an University of Electronic Science and Technology,16/893
  30. Research on Security Architecture in Grid Computing System,CaiZhun/Shandong University,0/695
  31. Research on the multi - party security protocol,ZhangPeng/Zhejiang University,2/390
  32. Research on Online Public Key Cryptographic System and Related Topics,YuShuYao/Institute of Computing Technology,0/327
  33. Remote Access Authentication and Related Topics under Mobile Wireless Scenarios,YeRunGuo/Institute of Computing Technology,1/405
  34. A number of theoretical studies of the Internet network security and secure Web system design and implementation,WeiWei/Institute of Computing Technology,2/664
  35. Security analysis of group key agreement in dynamic peer-to-peer network , and packet encryption algorithm Safer,ZhengShiHui/Shandong University,0/241
  36. Research on PKI Based Network Security Technology and Application,TianWenChun/South China University of Technology,2/532
  37. Several Problems in Computational Number Theory,ZhuWenYu/Sichuan University,2/288
  38. Security Approaches and Technology for Wireless Networks,ZhuJianMing/Xi'an University of Electronic Science and Technology,25/1704
  39. Research of Network Quality of Service and Network Security Based on Network Processor,XieLiFeng/Zhejiang University,0/501
  40. Research of Security Architecture of IP Layer and Its Practice,TanXingLie/Sichuan University,10/611
  41. Research and Implementation of High Performance Virtual Private Network Based on Network Processor,ZhangFeng/Zhejiang University,1/323
  42. Design and Analysis of Security Protocol,TongHuaZhang/Zhejiang University,4/531
  43. Research on Pairing-based Group Cryptography,QinBo/Xi'an University of Electronic Science and Technology,2/279
  44. Research on Key Technologies for Password-Authenticated Key Exchange Protocols,LiuXiuMei/Northeastern University,3/206
  45. Research on the Applications of Several NP Problems and Cryptography Problems Based on DNA Self-assembly,ChengZhen/Huazhong University of Science and Technology,0/168
  46. Study on Authenticated Key Exchange Protocols and Their Security Models,HuangHai/Shanghai Jiaotong University,0/356
  47. Study on Authenticated Key Exchange,JinHai/University of Science and Technology of China,1/234
  48. Analysis and Design of Authentication and Key Exchange Protocols,ZhangLiJiang/Shandong University,2/466
  49. Researching Security Mechanisms of S-box Based on the Polymorphic Cipher,YinYiFeng/Xi'an University of Electronic Science and Technology,1/113
  50. Research on Secure Communication Technologies in Wireless Mesh Networks,DingXuYang/University of Electronic Science and Technology,1/327

Total 4 Pages First Previous 1 2 3 4 Next Last

© 2012 www.DissertationTopic.Net  Mobile