Dissertation 

About 200 item dissertation in line with proxy signature query results,the following is 1 to 50(Search took 0.050 seconds)

  1. Research on Identity-Based Signature Scheme in the Standard Model,GuKe/Central South University,0/158
  2. Based on Bilinear Bairing of the Proxy Signature and Proxy Multi-signature Scheme of Research,DengJunLei/East China Jiaotong University,0/3
  3. Research and design on proxy signature scheme,YangLi/Shaanxi Normal University,0/37
  4. Study on the Sanitizable Digital Signature Scheme,LiRui/Chang'an University,0/3
  5. Research on Key Technologies of Authentication in SOA Environment,WangZuo/PLA Information Engineering University,0/36
  6. Provably Secure Identity-based Signature Scheme,ShiBaoMing/Lanzhou University of Technology,0/45
  7. Research of Electronic Commerce Security Technology,WangNingChang/Yangzhou University,0/135
  8. Design and implementation of QR security analysis of two-dimensional code,GaoYanShou/Nanjing University of Technology and Engineering,0/343
  9. Randomized Proxy Blind Signcryption Scheme Without Paring Design,ZhangLei/Guangxi University,0/3
  10. Research on the Multi-proxy Signature Based on Self-certified Cryptosystem,LiangYan/Shanghai Jiaotong University,0/19
  11. Research and Design of Proxy Blind Signature Scheme,HuangZuo/Changsha University of Science and Technology,0/48
  12. Cryptanalysis and Improvement of Two Cryptographic Protocols,MiaoXiaoYu/Hangzhou University of Electronic Science and Technology,0/26
  13. Research on Proxy Signature Scheme,LiuTao/Yanshan University,0/48
  14. The secret of the affine transformation and the zero knowledge proof of multivariable proxy signature scheme based on,LiZhiXing/Nanjing University of Technology and Engineering,0/31
  15. Research of Technology of Proxy Signature with Fast Revocation,HuangYueYing/Xi'an University of Electronic Science and Technology,0/10
  16. Design and Analysis on ID-based Proxy Signature,HouXingHua/Northeastern University,0/21
  17. Research on Certificateless Proxy Signature Schemes,ZhaoXueJiao/West China University,0/0
  18. Research and Design on the Designated Verifier Signature,LiuXiong/West China University,0/0
  19. Research of E-Voting Protocol Based on Proxy Blind Signature,ZhangBiJun/West China University,0/0
  20. Study and Design on Public Key Cryptosystems with Additional Properties,HuXiaoMing/Shanghai Jiaotong University,0/18
  21. The Research of (t,n) Threshold Signature Scheme Without Trust Part,XuYan/Southwest Jiaotong University,0/11
  22. Research on Two Kinds of Group Oriented Digital Signature,WangZuo/Xi'an University of Electronic Science and Technology,0/7
  23. Design of Signature Scheme Based on Multivariate Cryptosystem and the Construction and Application of Conformal Iterated Function,SunChangYi/PLA Information Engineering University,0/9
  24. Identity Based Threshold Proxy Signature System on Cloud Platform,ZuoYingYing/Harbin Institute of Technology,0/4
  25. Research on the Proxy Signature System,LiWei/Xi'an University of Electronic Science and Technology,0/20
  26. Study on non threshold proxy signature certificate,CaoTianQing/Shaanxi Normal University,0/19
  27. Research and Design on Multivarite Signature,TaoYu/Xi'an University of Electronic Science and Technology,0/29
  28. Several threshold signature scheme based on identity,GaoHuanHuan/Shaanxi Normal University,0/26
  29. Research on several kinds of proxy blind signature scheme,LiuZuo/Shaanxi Normal University,0/35
  30. Research on Two Types of Proxy Signature Schemes with Special Properties,CuiTao/Shandong Normal University,0/28
  31. Research on Lattice-based Proxy Signature,LiuCheng/Xi'an University of Electronic Science and Technology,0/49
  32. Certificate-based Proxy Signature and Certificate-based Blind Signature,ChenJiangShan/Zhangzhou Normal University,0/42
  33. Proxy Signature Scheme with Security Based on Elliptic Curve,WuChengXiang/South China University of Technology,0/45
  34. Research on Key Problem of Proxy Cryptography,MengHui/Beijing,0/63
  35. Research on Public Key Cryptography Based on Elliptic Curve,LiFengYue/Qinghai Normal,0/63
  36. A Proxy Signature Using Multivariate Equations on Quaternion Ring,MaSen/Xinyang Normal University,0/9
  37. Research on Complex Digital Signature Schemes and Security Authentication,ShiRongHua/Central South University,1/271
  38. Research and Design of Secure Protocols and Schemes,HuLanLan/Beijing University of Posts and Telecommunications,2/519
  39. Research on Delegation Based Digital Signature,CaoFeng/Shanghai Jiaotong University,0/404
  40. Research on Digital Signatures with Additional Properties and Fair Exchange Protocols,ZhangQing/Beijing University of Posts and Telecommunications,2/309
  41. Research on Some Extensions of Proxy Signature,WangQin/Shanghai Jiaotong University,5/566
  42. Design and Analysis of Proxy Signature and Group Signature,LuRongBo/Southwest Jiaotong University,2/454
  43. Study and Design of Several Proxy Cryptographic Schemes,LuRongXing/Shanghai Jiaotong University,8/402
  44. Research on Authentication Architecture and Related Technologies of Information System,PengShuangHe/Beijing Jiaotong University,9/685
  45. Based on elliptic curves and bilinear on the digital signature,WangHongTao/Shandong University,5/850
  46. Research on the Digital Signature Based on ECC and Bilinear Pairings,WangHongTao/Shandong University,0/167
  47. Research on the Authentication and Key Agreement for Heterogeneous Wireless Network Interworking,JiangJun/Shanghai Jiaotong University,10/767
  48. Research about the the group signature special group signature scheme,XieZuo/Zhejiang University,1/241
  49. Non-interactive publicly available authentication secret sharing and its application,LiuZuo/PLA Information Engineering University,0/307
  50. Signatures with Additional Properties and Its Applications,FuXiaoTong/Xi'an University of Electronic Science and Technology,11/479

Total 4 Pages First Previous 1 2 3 4 Next Last

© 2012 www.DissertationTopic.Net  Mobile