About 155 item dissertation in line with Key Exchange query results,the following is 1 to 50(Search took 0.080 seconds)
- Research and Implementation of Secure Voice Communication,YinManGang/Hangzhou University of Electronic Science and Technology,0/30
- Authenticated Key Exchange and Proof in eCK Model,TianJing/Northeastern University,0/1
- Research on Provably Secure Password Authentication Key Exchange Protocol,YangHan/China University of Mining and Technology,0/17
- Research and Design of Password-based Mutual Authentication Key Agreement Scheme with Smart Card,WangZuo/Shenyang Normal,0/5
- Design and Security Proof of Multi-Factor Authenticated Key Exchange Protocols,LiuYing/PLA Information Engineering University,0/20
- Research on Authenticated Key Exchange Protocol Based on Diffie-Hellman Method,YangZengFu/Zhengzhou University,0/59
- Research on Interactive Security Protocol Analysis Based-on Uinversal Composable,QiQingLei/Henan University of Technology,0/14
- Design and Security Analysis of Anonymous Authenticated Key Exchange Protocols,LiuCong/PLA Information Engineering University,0/34
- Security Alliance’s Design and Application Based on IPSec Protocol,XiaoBo/Chongqing University,0/0
- Research of Key Exchange and Encrypted Authentication on the Network Card,WangDongHong/Northeast Forestry University,0/43
- Design and Analysis of Attribute Based Authenticated Key Exchange Protocols,WeiJiangHong/PLA Information Engineering University,0/49
- Research and implementation of security technology in network space,LinWei/University of Electronic Science and Technology,0/93
- The security analysis and verification of the IPv6 protocol,GuoLinLin/University of Electronic Science and Technology,0/126
- An Access Control Model for Cloud Computing Based on T-RBAC Model and Three-party Key Exchange Protocol,WangXiaoWei/Fudan University,0/145
- The Research and Application of IPSec VPN Based on Digital Certificate,ChaiGuoJie/Shandong University,0/209
- Analysis and design of security protocols based on Cloud Computing,HeXiaoHu/University of Electronic Science and Technology,1/228
- File Transparent Encryption System Based on Xen,WangZuo/Beijing University of Posts and Telecommunications,2/106
- Research on Identity Based Cryptosystem,WangZuo/Shandong University,1/638
- Research of ZigBee Multi-level Routing Algorithms and Security Mechanisms,ZhangMinPeng/Guangdong University of Technology,0/66
- Research on Provably Security of Authenticated Key Exchange Protocols,YuBing/Northeastern University,0/33
- Research on Password-based Authenticated Key Exchange Protocols and Associated Encryption Algorithms from Lattices,YeMao/PLA Information Engineering University,0/2
- Analytical Improvement and Implementation for Internet Key Exchange Protocol,XieZuoRen/Lanzhou University,0/10
- The Security Definition and Analysis of Fixed SE-KE Protocol,HuLang/Fudan University,0/19
- Research on Attribute Based Cryptographic Algorithms,LiuJian/University of Electronic Science and Technology,0/34
- Security Study on Cloud Computing Based Mobile Application Model,XiongYuCong/Beijing Jiaotong University,0/225
- Design and Analysis of Provably Secure Authentication and Key Exchange Protocols,CaoChunJie/Xi'an University of Electronic Science and Technology,10/682
- Ergodic Matrices and Its Applications in Public Key Cryptography,PeiShiHui/Jilin University,4/226
- Public wireless LAN security system can experience the formalization of security analysis,SongYuBo/Southeast University,1/395
- Study of Authentication and Key Agreement Protocols in Wireless Networks,LiXingHua/Xi'an University of Electronic Science and Technology,16/893
- Research on Security Architecture in Grid Computing System,CaiZhun/Shandong University,0/695
- Research on the multi - party security protocol,ZhangPeng/Zhejiang University,2/390
- Research on Online Public Key Cryptographic System and Related Topics,YuShuYao/Institute of Computing Technology,0/327
- Remote Access Authentication and Related Topics under Mobile Wireless Scenarios,YeRunGuo/Institute of Computing Technology,1/405
- A number of theoretical studies of the Internet network security and secure Web system design and implementation,WeiWei/Institute of Computing Technology,2/664
- Security analysis of group key agreement in dynamic peer-to-peer network , and packet encryption algorithm Safer,ZhengShiHui/Shandong University,0/241
- Research on PKI Based Network Security Technology and Application,TianWenChun/South China University of Technology,2/532
- Several Problems in Computational Number Theory,ZhuWenYu/Sichuan University,2/288
- Security Approaches and Technology for Wireless Networks,ZhuJianMing/Xi'an University of Electronic Science and Technology,25/1704
- Research of Network Quality of Service and Network Security Based on Network Processor,XieLiFeng/Zhejiang University,0/501
- Research of Security Architecture of IP Layer and Its Practice,TanXingLie/Sichuan University,10/611
- Research and Implementation of High Performance Virtual Private Network Based on Network Processor,ZhangFeng/Zhejiang University,1/323
- Design and Analysis of Security Protocol,TongHuaZhang/Zhejiang University,4/531
- Research on Pairing-based Group Cryptography,QinBo/Xi'an University of Electronic Science and Technology,2/279
- Research on Key Technologies for Password-Authenticated Key Exchange Protocols,LiuXiuMei/Northeastern University,3/206
- Research on the Applications of Several NP Problems and Cryptography Problems Based on DNA Self-assembly,ChengZhen/Huazhong University of Science and Technology,0/168
- Study on Authenticated Key Exchange Protocols and Their Security Models,HuangHai/Shanghai Jiaotong University,0/356
- Study on Authenticated Key Exchange,JinHai/University of Science and Technology of China,1/234
- Analysis and Design of Authentication and Key Exchange Protocols,ZhangLiJiang/Shandong University,2/466
- Researching Security Mechanisms of S-box Based on the Polymorphic Cipher,YinYiFeng/Xi'an University of Electronic Science and Technology,1/113
- Research on Secure Communication Technologies in Wireless Mesh Networks,DingXuYang/University of Electronic Science and Technology,1/327
Total 4 Pages First Previous 1 2 3 4 Next Last
© 2012 www.DissertationTopic.Net Mobile
|