About 152 item dissertation in line with security analysis query results,the following is 1 to 50(Search took 0.035 seconds)

  1. Security Analysis and Testing Research for Host Monitoring and Auditing Product Based on Windows,LiHai/Beijing Jiaotong University,0/17
  2. Research on Image Encryption Method Based on Chaos and Fractional Fourier Transform,SongJunHong/Harbin Institute of Technology,0/40
  3. Color Image Encryption Based on Gyrator Transform and DNA Computing,LiuChenZuo/East China University of Science and Technology,0/1
  4. Digital Image Encryption Based on GPGPU,WenWanLi/Hangzhou University of Electronic Science and Technology,0/1
  5. Optimal Configuration of Demand Side ES for Improving the Power System Security,LiZuoZuo/Huazhong University of Science and Technology,0/7
  6. The Optimization of User Utility and Security Based on Access Control Model in the Cloud Computing Environment,YangLiu/Hunan University,0/620
  7. Research on Security Protocols for RFID Systems,ZhouJingXian/Beijing University of Posts and Telecommunications,0/46
  8. The Design and Implementation of the Harbin Railway Bureau Security Analysis and Forecast Systems,ZhangShuWei/Shanghai Jiaotong University,0/67
  9. A Resource Centric Security Requirements Elicitation and Modeling Framework,LiTong/Tsinghua University,0/47
  10. Dynamics Analysis and Research on Image Encryption Algorithm Based on Chaos Systems,XiaoXia/Yanshan University,0/47
  11. Research on Trust-Based Access Control Model in Cloud Computing Environment,TanZhanJiang/Hunan University,0/89
  12. A RBACc-Based Access Control Administrative Model for Cloud Computing,WeiJuan/Hunan University,0/129
  13. Research of the Model of Information Hiding and the Analysis of the Security,LiXin/Beijing University of Posts and Telecommunications,0/427
  14. The Study of Color Image Encryption Algorithm Based on Chaos Theory,ChenGuoLiang/Lanzhou University,3/224
  15. Analysis and Design of Certificateless Encryption Schemes Against Malicious KGC Attacks,YangWenJie/Nanjing Normal University,0/0
  16. Research of Related Problems of Quantum Key Distribution and Authentication,ZhuJun/Shanghai Jiaotong University,0/29
  17. Research on the Design and Analysis of Block Cipher Algorithm,LuYanRong/Xi'an University of Electronic Science and Technology,0/86
  18. Applications of Chinese Remainder Theorem in Cryptography,LiuZuo/Qinghai Normal,0/99
  19. Visualization System of Power System Security Analysis Based on CIM,WangTengFei/Tianjin University,0/85
  20. The Application and Research on the Interaction between Firewall and IDS in Distribution Automation System,YangHaiPeng/North China Electric Power University,0/35
  21. Static Security Analysis of the Distribution Network Based on the Busbar Automatic Transfer Switch,ZhaoLiang/Zhengzhou University,0/49
  22. Preventive Security-Constrained Optimal Power Flow with Constraints Limiting the Number of Control Actions,QiLe/Guangxi University,0/4
  23. Research on the Evaluation Model and Method of City Power Grid Security Analysis Based on Power Supply Capability,JiaBin/Yanshan University,0/2
  24. Study and Realization of Intelligent Management System of Dispatching,TianXiong/Hunan University,0/9
  25. The Visualization Design and Implementation of110kV Power Grid Dispatching Arrangement System,LiuGuoTe/Hunan University,0/17
  26. Fast Realization of Power System Static Security Analysis,CuiWei/Zhengzhou University,0/182
  27. Research on Single-port and Multi-port External Network Static Equivalent Method Based on the Internal Imformaion,ZhuLiu/Chongqing University,0/1
  28. Research on Dynamic Equivalent Method for Interconnected Power System Areas,ZhouYang/Huazhong University of Science and Technology,0/71
  29. Network Planning Research in Huining Area,LingYanKun/North China Electric Power University,0/72
  30. Power System Static State N-1Verification Based on Probability Analysis,WangYongHui/Zhengzhou University,1/121
  31. Analysis of Construction Monitoring and Security for Rotating Bridge,GaoTao/Beijing Jiaotong University,0/118
  32. Isolation and Identification of Yeast and Analysis the Safety of Koumiss in Xinjiang,LiJing/Xinjiang Agricultural University,0/157
  33. The Study on Security Analysis of Chaos-based One-way Hash Function,WangHao/Changsha University of Science and Technology,0/9
  34. Research on Quantum Communication Algorithm Based on Free-space,ZhongBo/Ningbo University,0/72
  35. Research on Robust and Semi-Fragile Digital Watermark,WangJinWei/Nanjing University of Technology and Engineering,5/685
  36. Design and Analysis of Proxy Signature and Group Signature,LuRongBo/Southwest Jiaotong University,2/454
  37. Research on Survivability Analysis for Network Information Systems,LinXueGang/Zhejiang University,7/649
  38. Signatures with Additional Properties and Its Applications,FuXiaoTong/Xi'an University of Electronic Science and Technology,11/479
  39. Information Hiding,ZhangHuaXiong/Zhejiang University,1/723
  40. Logic security analysis of cryptographic protocols - A New BAN-like logic,LiYiFa/PLA Information Engineering University,12/223
  41. Cryptanalysis of CBC-MAC and Hash Function Related Algorithms,JiaZuoZuo/Shandong University,1/304
  42. Research on Time Process-Oriented Power System Static Security Analysis and Daily Generation Scheduling,YuJiaXi/Harbin Institute of Technology,0/227
  43. Research on 3d Invertible Map Based Image Encryption Algorithm of Satelite Image,LiJuan/Harbin Institute of Technology,0/52
  44. Software security research and development of key technologies to achieve,FengBo/Beijing University of Posts and Telecommunications,2/437
  45. Yan'an area of grid operation mode,WangXiGang/Xi'an University of Technology,1/198
  46. Fast Power System State Calculation Program Realization and Algorithm Research in Fault,DengYang/Hunan University,3/155
  47. Study on the Food Security Issue of Jilin Provience,LiuChang/Jilin University,1/223
  48. Regional Power Grid Remote BATS Program Research and Development of Static Security Analysis Software,MaXiuLin/North China Electric Power University (Hebei),1/68
  49. The Application of Web Based Date Mining for Analysis of College Entrance Examination’s Wills,XuFei/Henan University,0/192
  50. Based on Dynamic Analysis of the Construction Safety Supervision,WangZuoTian/Beijing Jiaotong University,0/267

Total 4 Pages First Previous 1 2 3 4 Next Last

© 2012 www.DissertationTopic.Net  Mobile