About 41 item dissertation in line with hash chain query results,the following is 1 to 50(Search took 0.04 seconds)
- Key management scheme for wireless sensor network and protocol research,HanChao/Nanjing University of Technology and Engineering,0/4
- Research on Key Management for Wireless Sensor Networks,CaiYunFeng/Nanjing University of Aeronautics and Astronautics,0/20
- Research on Interactive Security Protocol Analysis Based-on Uinversal Composable,QiQingLei/Henan University of Technology,0/14
- Research on Security Inter-domain Routing Protocol Based on Behavior and Identity Trust,KangZhiRong/Xi'an University of Electronic Science and Technology,0/34
- Research of Electronic Commerce Security Technology,WangNingChang/Yangzhou University,0/135
- Authentication of Relational Query Based on Hierarchical Hash Chain,XiaoQiong/Northeastern University,0/7
- Prior to the analysis and design of security proxy blind signature,LuShuYi/Heilongjiang University,0/16
- Research of Key Management and Authentication Mechanisms for Ad Hoc Network,XuShuaiWen/Jinan University,0/21
- Key Management Schemes for Wireless Sensor Networks Based on Key Pool,RenHeng/Hunan University,0/20
- WSN Key Management Scheme Based on Clustering Structure,ShiYuanJie/Guangdong University of Technology,0/19
- Research of Mutual Authentication Protocol for RFID Based on Hash Function and Public Key,LiangHuanZuo/South China University of Technology,0/236
- The Research on RFID Mutual Authentication Protocol Based on Hash-Chain,ZhouZuo/Southwest Jiaotong University,1/144
- The Research of Mobile Payment Security Protocols Based on Symmetric Cryptosystem,GaoBaoSheng/Southwest Jiaotong University,1/224
- False Data Filtering in Wireless Sensor Networks,LiuZhiXiong/Central South University,0/225
- Research on Security of Mobile Payment,LiFeng/Shandong University,2/967
- Research and Design of Authentication Security Infrastructure of WLAN,ZhangHaoJun/PLA Information Engineering University,5/809
- Research on Essential Security Issues of Mobile Ad Hoc Networks,LiJingFeng/PLA Information Engineering University,5/970
- Research on Micropayment Protocols,LangWeiMin/Huazhong University of Science and Technology,7/363
- Research on Payment Protocols for M-Learning Resources,FuXiong/Huazhong University of Science and Technology,0/636
- Research on Key Technologies of Mobile Commerce Security,ZhuZhenRong/Beijing University of Posts and Telecommunications,3/974
- Research on Key Management of Wireless Mobile Ad Hoc Network,DuChunLai/Harbin Institute of Technology,0/269
- Research on Security Protocols in 3G-WLAN Integrated Network,FuJianQing/Zhejiang University,0/372
- Research of Identity Based Threshold Secret Sharing and Its Applications,LiDaWei/Nanjing University of Posts and Telecommunications,0/110
- Design and Analysis of Electronic Commerce Security Protocols,ChenLi/PLA Information Engineering University,0/427
- Design and Analysis of Cryptographic Protocols for RFID,PeiYouLin/Hefei University of Technology,12/655
- Uyghur Khazak Kirgiz Multilingual Search Enigne Inverted Index Module and Its Implementation,WuJunSen/Xinjiang University,2/103
- Research on Micropayment and Design Scheme,NingJiaZhi/Tianjin University of Finance and Economics,2/198
- Authentication and Security in Light-weight Drop-and-Go Networks,ZhouLong/Sichuan University,0/71
- Streaming based on hash chain signature validation study data,LiuChunLei/Hunan University,2/92
- Research on Security and Privacy for Radio Frequency Identification,GuoHu/Xi'an University of Technology,5/299
- The Research and Implementation of Revocation Schemes for Ad Hoc Networks,MoJie/Jinan University,0/31
- A Study and Implement of the Micropayment Scheme,HeWenZuo/Beijing University of Posts and Telecommunications,0/83
- Research on Forward Security and Strong Blindness,FuXiaoJuan/Qinghai Normal,2/37
- The Performance Analysis and Simulation on Source Authentication Protocol in Multicast,BaoYan/Jilin University,0/76
- Security and Privacy Protection Research of RFID Application System,YangFan/Central China Normal University,1/97
- Several key technologies commerce,WanShiChang/Shaanxi Normal University,0/166
- Based on one-way hash chain of the Ad Hoc network authentication and key management research,WengLiPing/Central South University,0/67
- Securit Group Data Source Authentication Protocol Based on Error-correcting Code,LiChunMei/Beijing Institute of Technology,0/26
- The Research and Implement of Micropayment Model Based on Hash Chain,YinXiaoHong/Northwest University of Science and Technology,0/34
- The Research of PKI Cross-Domain Bridge Trust Model Based on Validation Agent,BaoLei/Shanghai Jiaotong University,0/33
- High flow conditions P2P streaming real-time behavior recognition system design and implementation,PengXiaoTian/Huazhong University of Science and Technology,0/23
Total 1 Pages First Previous 1 Next Last
© 2012 www.DissertationTopic.Net Mobile
|