Dissertation 

About 41 item dissertation in line with hash chain query results,the following is 1 to 50(Search took 0.046 seconds)

  1. Key management scheme for wireless sensor network and protocol research,HanChao/Nanjing University of Technology and Engineering,0/4
  2. Research on Key Management for Wireless Sensor Networks,CaiYunFeng/Nanjing University of Aeronautics and Astronautics,0/20
  3. Research on Interactive Security Protocol Analysis Based-on Uinversal Composable,QiQingLei/Henan University of Technology,0/14
  4. Research on Security Inter-domain Routing Protocol Based on Behavior and Identity Trust,KangZhiRong/Xi'an University of Electronic Science and Technology,0/34
  5. Research of Electronic Commerce Security Technology,WangNingChang/Yangzhou University,0/135
  6. Authentication of Relational Query Based on Hierarchical Hash Chain,XiaoQiong/Northeastern University,0/7
  7. Prior to the analysis and design of security proxy blind signature,LuShuYi/Heilongjiang University,0/16
  8. Research of Key Management and Authentication Mechanisms for Ad Hoc Network,XuShuaiWen/Jinan University,0/21
  9. Key Management Schemes for Wireless Sensor Networks Based on Key Pool,RenHeng/Hunan University,0/20
  10. WSN Key Management Scheme Based on Clustering Structure,ShiYuanJie/Guangdong University of Technology,0/19
  11. Research of Mutual Authentication Protocol for RFID Based on Hash Function and Public Key,LiangHuanZuo/South China University of Technology,0/236
  12. The Research on RFID Mutual Authentication Protocol Based on Hash-Chain,ZhouZuo/Southwest Jiaotong University,1/144
  13. The Research of Mobile Payment Security Protocols Based on Symmetric Cryptosystem,GaoBaoSheng/Southwest Jiaotong University,1/224
  14. False Data Filtering in Wireless Sensor Networks,LiuZhiXiong/Central South University,0/225
  15. Research on Security of Mobile Payment,LiFeng/Shandong University,2/967
  16. Research and Design of Authentication Security Infrastructure of WLAN,ZhangHaoJun/PLA Information Engineering University,5/809
  17. Research on Essential Security Issues of Mobile Ad Hoc Networks,LiJingFeng/PLA Information Engineering University,5/970
  18. Research on Micropayment Protocols,LangWeiMin/Huazhong University of Science and Technology,7/363
  19. Research on Payment Protocols for M-Learning Resources,FuXiong/Huazhong University of Science and Technology,0/636
  20. Research on Key Technologies of Mobile Commerce Security,ZhuZhenRong/Beijing University of Posts and Telecommunications,3/974
  21. Research on Key Management of Wireless Mobile Ad Hoc Network,DuChunLai/Harbin Institute of Technology,0/269
  22. Research on Security Protocols in 3G-WLAN Integrated Network,FuJianQing/Zhejiang University,0/372
  23. Research of Identity Based Threshold Secret Sharing and Its Applications,LiDaWei/Nanjing University of Posts and Telecommunications,0/110
  24. Design and Analysis of Electronic Commerce Security Protocols,ChenLi/PLA Information Engineering University,0/427
  25. Design and Analysis of Cryptographic Protocols for RFID,PeiYouLin/Hefei University of Technology,12/655
  26. Uyghur Khazak Kirgiz Multilingual Search Enigne Inverted Index Module and Its Implementation,WuJunSen/Xinjiang University,2/103
  27. Research on Micropayment and Design Scheme,NingJiaZhi/Tianjin University of Finance and Economics,2/198
  28. Authentication and Security in Light-weight Drop-and-Go Networks,ZhouLong/Sichuan University,0/71
  29. Streaming based on hash chain signature validation study data,LiuChunLei/Hunan University,2/92
  30. Research on Security and Privacy for Radio Frequency Identification,GuoHu/Xi'an University of Technology,5/299
  31. The Research and Implementation of Revocation Schemes for Ad Hoc Networks,MoJie/Jinan University,0/31
  32. A Study and Implement of the Micropayment Scheme,HeWenZuo/Beijing University of Posts and Telecommunications,0/83
  33. Research on Forward Security and Strong Blindness,FuXiaoJuan/Qinghai Normal,2/37
  34. The Performance Analysis and Simulation on Source Authentication Protocol in Multicast,BaoYan/Jilin University,0/76
  35. Security and Privacy Protection Research of RFID Application System,YangFan/Central China Normal University,1/97
  36. Several key technologies commerce,WanShiChang/Shaanxi Normal University,0/166
  37. Based on one-way hash chain of the Ad Hoc network authentication and key management research,WengLiPing/Central South University,0/67
  38. Securit Group Data Source Authentication Protocol Based on Error-correcting Code,LiChunMei/Beijing Institute of Technology,0/26
  39. The Research and Implement of Micropayment Model Based on Hash Chain,YinXiaoHong/Northwest University of Science and Technology,0/34
  40. The Research of PKI Cross-Domain Bridge Trust Model Based on Validation Agent,BaoLei/Shanghai Jiaotong University,0/33
  41. High flow conditions P2P streaming real-time behavior recognition system design and implementation,PengXiaoTian/Huazhong University of Science and Technology,0/23

Total 1 Pages First Previous 1 Next Last

© 2012 www.DissertationTopic.Net  Mobile