About 200 item dissertation in line with proxy signature query results,the following is 1 to 50(Search took 0.050 seconds)
- Research on Identity-Based Signature Scheme in the Standard Model,GuKe/Central South University,0/158
- Based on Bilinear Bairing of the Proxy Signature and Proxy Multi-signature Scheme of Research,DengJunLei/East China Jiaotong University,0/3
- Research and design on proxy signature scheme,YangLi/Shaanxi Normal University,0/37
- Study on the Sanitizable Digital Signature Scheme,LiRui/Chang'an University,0/3
- Research on Key Technologies of Authentication in SOA Environment,WangZuo/PLA Information Engineering University,0/36
- Provably Secure Identity-based Signature Scheme,ShiBaoMing/Lanzhou University of Technology,0/45
- Research of Electronic Commerce Security Technology,WangNingChang/Yangzhou University,0/135
- Design and implementation of QR security analysis of two-dimensional code,GaoYanShou/Nanjing University of Technology and Engineering,0/343
- Randomized Proxy Blind Signcryption Scheme Without Paring Design,ZhangLei/Guangxi University,0/3
- Research on the Multi-proxy Signature Based on Self-certified Cryptosystem,LiangYan/Shanghai Jiaotong University,0/19
- Research and Design of Proxy Blind Signature Scheme,HuangZuo/Changsha University of Science and Technology,0/48
- Cryptanalysis and Improvement of Two Cryptographic Protocols,MiaoXiaoYu/Hangzhou University of Electronic Science and Technology,0/26
- Research on Proxy Signature Scheme,LiuTao/Yanshan University,0/48
- The secret of the affine transformation and the zero knowledge proof of multivariable proxy signature scheme based on,LiZhiXing/Nanjing University of Technology and Engineering,0/31
- Research of Technology of Proxy Signature with Fast Revocation,HuangYueYing/Xi'an University of Electronic Science and Technology,0/10
- Design and Analysis on ID-based Proxy Signature,HouXingHua/Northeastern University,0/21
- Research on Certificateless Proxy Signature Schemes,ZhaoXueJiao/West China University,0/0
- Research and Design on the Designated Verifier Signature,LiuXiong/West China University,0/0
- Research of E-Voting Protocol Based on Proxy Blind Signature,ZhangBiJun/West China University,0/0
- Study and Design on Public Key Cryptosystems with Additional Properties,HuXiaoMing/Shanghai Jiaotong University,0/18
- The Research of (t,n) Threshold Signature Scheme Without Trust Part,XuYan/Southwest Jiaotong University,0/11
- Research on Two Kinds of Group Oriented Digital Signature,WangZuo/Xi'an University of Electronic Science and Technology,0/7
- Design of Signature Scheme Based on Multivariate Cryptosystem and the Construction and Application of Conformal Iterated Function,SunChangYi/PLA Information Engineering University,0/9
- Identity Based Threshold Proxy Signature System on Cloud Platform,ZuoYingYing/Harbin Institute of Technology,0/4
- Research on the Proxy Signature System,LiWei/Xi'an University of Electronic Science and Technology,0/20
- Study on non threshold proxy signature certificate,CaoTianQing/Shaanxi Normal University,0/19
- Research and Design on Multivarite Signature,TaoYu/Xi'an University of Electronic Science and Technology,0/29
- Several threshold signature scheme based on identity,GaoHuanHuan/Shaanxi Normal University,0/26
- Research on several kinds of proxy blind signature scheme,LiuZuo/Shaanxi Normal University,0/35
- Research on Two Types of Proxy Signature Schemes with Special Properties,CuiTao/Shandong Normal University,0/28
- Research on Lattice-based Proxy Signature,LiuCheng/Xi'an University of Electronic Science and Technology,0/49
- Certificate-based Proxy Signature and Certificate-based Blind Signature,ChenJiangShan/Zhangzhou Normal University,0/42
- Proxy Signature Scheme with Security Based on Elliptic Curve,WuChengXiang/South China University of Technology,0/45
- Research on Key Problem of Proxy Cryptography,MengHui/Beijing,0/63
- Research on Public Key Cryptography Based on Elliptic Curve,LiFengYue/Qinghai Normal,0/63
- A Proxy Signature Using Multivariate Equations on Quaternion Ring,MaSen/Xinyang Normal University,0/9
- Research on Complex Digital Signature Schemes and Security Authentication,ShiRongHua/Central South University,1/271
- Research and Design of Secure Protocols and Schemes,HuLanLan/Beijing University of Posts and Telecommunications,2/519
- Research on Delegation Based Digital Signature,CaoFeng/Shanghai Jiaotong University,0/404
- Research on Digital Signatures with Additional Properties and Fair Exchange Protocols,ZhangQing/Beijing University of Posts and Telecommunications,2/309
- Research on Some Extensions of Proxy Signature,WangQin/Shanghai Jiaotong University,5/566
- Design and Analysis of Proxy Signature and Group Signature,LuRongBo/Southwest Jiaotong University,2/454
- Study and Design of Several Proxy Cryptographic Schemes,LuRongXing/Shanghai Jiaotong University,8/402
- Research on Authentication Architecture and Related Technologies of Information System,PengShuangHe/Beijing Jiaotong University,9/685
- Based on elliptic curves and bilinear on the digital signature,WangHongTao/Shandong University,5/850
- Research on the Digital Signature Based on ECC and Bilinear Pairings,WangHongTao/Shandong University,0/167
- Research on the Authentication and Key Agreement for Heterogeneous Wireless Network Interworking,JiangJun/Shanghai Jiaotong University,10/767
- Research about the the group signature special group signature scheme,XieZuo/Zhejiang University,1/241
- Non-interactive publicly available authentication secret sharing and its application,LiuZuo/PLA Information Engineering University,0/307
- Signatures with Additional Properties and Its Applications,FuXiaoTong/Xi'an University of Electronic Science and Technology,11/479
Total 4 Pages First Previous 1 2 3 4 Next Last
© 2012 www.DissertationTopic.Net Mobile
|