About 40 item dissertation in line with key escrow query results,the following is 1 to 50(Search took 0.082 seconds)
- Research on Identity-Based Broadcast Encryption,XuYuWei/North China University of,0/39
- Research on Identity Based Cryptosystem Public Key Management Scheme,LiuXue/Shandong University,0/101
- Study on the ID-Based Signature Scheme,LiuXiaoDong/Shandong University,2/297
- The Formal Study of Secure Threshold Cryptographic Schemes,LongYu/Shanghai Jiaotong University,1/347
- Research on Key Problems in Identity Based Public Key Cryptography,ShiYiJuan/Shanghai Jiaotong University,4/876
- Key Escrow and its application to Electronic Cash,YangBo/Xi'an University of Electronic Science and Technology,1/204
- The Research on Digital Signature Schemes,WangShaoHui/Shandong University,5/1044
- On Provably Secure Identity-Based Encryption Scheme and Its Applications,XuPeng/Huazhong University of Science and Technology,0/307
- Research on Identity-Based Cryptography Schemes,ZhangBo/Shandong University,3/396
- Research on Identity-Based Cryptography,ZhangZhi/Huazhong University of Science and Technology,2/210
- Related Research on Attribute Based Cryptosystem,WangYongTao/Shanghai Jiaotong University,1/480
- Research on Some Topics of Modern Cryptosystem,ZhangLong/Beijing University of Posts and Telecommunications,0/239
- Research on the Key Escrow Problem in Identity Based Cryptosystem,JinZhengPing/Beijing University of Posts and Telecommunications,1/139
- Research on Identity-based Cryptography and Its Application in Wireless Mobile Payment,LiZuo/Huazhong University of Science and Technology,1/376
- Research on Identity-Based Key Management,WangRuiFang/Lanzhou University of Technology,0/149
- The Research on Digital Signature Schemes and Signcryption Schemes Based on Elliptic Curves,LiuWeiHua/Northwestern University,0/195
- Private Key Distribution Scheme of IBE System,ZhuQingFang/Henan University,1/103
- Design and Implementation of Secure Filesystem for Linux Operaring System,WeiZuoHui/Institute of Software,5/402
- Research on Key Management Techniques in PKI,GaoZhiQuan/Shandong University,3/289
- Research on Safe Key-Escrow Scheme,ShiXiaoHua/Yanshan University,0/88
- Research on Key Escrow Problem of Identity-Based Cryptography,ZhouJiaFa/PLA Information Engineering University,3/158
- Research and Application on Identity-Based Encryption,HuMing/Xi'an University of Electronic Science and Technology,8/340
- Research and Implementation for Cryptographic File System Based on Kylin Operating System,ZhongJingWei/National University of Defense Science and Technology,7/108
- Signcryption scheme and its application in key escrow,ChenRuiHu/PLA Information Engineering University,0/132
- The Research on Key Escrow Scheme for Flexible Placing of Escrow Agent,FanQiang/Hunan University,0/32
- Communication network Research and realization of the key escrow,ChenXuRi/Hunan University,0/70
- Identity-based cryptography and its application,ChenJing/University of Electronic Science and Technology,0/165
- Research on Security in Mobile Commerce,XiaBin/Yangzhou University,3/577
- Research on Provably Secure Digital Signature,XuXiaoQin/Yanshan University,0/154
- Study in Secure Multiparty Computation Protocols and Typical Applications,KangBin/PLA Information Engineering University,1/132
- Managed PKI system, distributed key technology research,LiuDeLong/Shandong University,0/69
- Research on Key Technical of Identity-Based Encryption and Application in Secure E-mail,WangXuanDan/Harbin University of Science and Technology,1/64
- Key escrow scheme with flexible features,XieLiLi/Heilongjiang University,1/29
- Research on Rational Cryptographic Protocols and Its Application,DuHeng/Shanghai Jiaotong University,2/101
- Research on Identity Based Public Key Management Scheme,ShenYuan/Henan University,0/130
- Research on Blind and Ring Signature and Their Application to Electronic Voting,ZhangXiaoHui/Xi'an University of Electronic Science and Technology,0/99
- Escrow Mechanism for Personal Security Keys on IBE,ZouYuePeng/Jilin University,0/41
- Research and Implementation of Transparent Encryption File System,ChenPing/Hangzhou University of Electronic Science and Technology,0/111
- Intrusion-Resilient Key Management Research on Digital Signature,WangLiangLiang/West China University,0/29
- Research and Design on Provably Secure Partially Blind Signature without Trusted PKG,PengWei/Lanzhou University of Technology,0/35
Total 1 Pages First Previous 1 Next Last
© 2012 www.DissertationTopic.Net Mobile
|