About 32 item dissertation in line with threshold cryptography query results,the following is 1 to 50(Search took 0.025 seconds)

  1. Research on Data Provenance’s Security Model,YanZuoZuo/Shandong University of Technology,1/191
  2. Research on Some Topics of Threshold Cryptography with Non-trusted Dealer,ShiXianZhi/Fujian Normal University,0/1
  3. Research on Adaptively Secure Threshold Cryptographical Scheme in the Standard Model,GanYuanJu/Beijing University of Posts and Telecommunications,0/11
  4. The Formal Study of Secure Threshold Cryptographic Schemes,LongYu/Shanghai Jiaotong University,1/347
  5. Research on Security and Applications of Threshold Cryptosystem,ChaiZhenChuan/Shanghai Jiaotong University,7/568
  6. Research on Essential Security Issues of Mobile Ad Hoc Networks,LiJingFeng/PLA Information Engineering University,5/970
  7. Mobile Ad Hoc Networks security,LiGuangSong/PLA Information Engineering University,1/591
  8. Ramp Perfect Hash Families,LongShouLun/University of Science and Technology of China,0/62
  9. Research on Forward-Secure Signature Schemes,QiuGang/Xi'an University of Electronic Science and Technology,0/240
  10. Research on Multiparty Oriented Cryptography Schemes,JiangZuo/Shandong University,0/286
  11. Research on Some New Threshold Encryption and Threshold Signature Schemes,YangZuoYi/Shanghai Jiaotong University,0/293
  12. Ad Hoc Networks Threshold Authentication Scheme and Intrusion Detection Model Study,LiZuoNan/Jilin University,1/351
  13. Efficient Key Management Schemes for Ad Hoc Network,HeBin/PLA Information Engineering University,1/178
  14. The Design and Implementation of Distributed Certification Authority System Based on Ad Hoc Network,GaoZhaoFeng/Nanjing University of Aeronautics and Astronautics,0/136
  15. Application of Elliptic Curve Cryptosystem,LiuDong/Chongqing University,3/141
  16. Intrusion Tolerance in CA,ChaiZhengYi/Zhengzhou University,0/78
  17. Based on elliptic curve cryptography door signcryption research,HuangGuoFang/Guizhou University,0/99
  18. Research of Secret Sharing and Threshold Cryptography,XuYan/Shandong University,3/297
  19. Research and Design of Certificate Authority Based on Intrusion Tolerance,LiuKun/Guizhou University,0/114
  20. The Study of Distributed Fault Tolerant Digital Sign System Based on P2P Network and Its Application,YangFan/Institute of Computing Technology,1/157
  21. Authentication and Key Management Mechanisms in Mobile Ad hoc Networks,WangLing/Huazhong University of Science and Technology,2/252
  22. Research on Trust Model in Mobile Ad Hoc Network,XiXin/Xi'an University of Electronic Science and Technology,0/113
  23. A Group Key Management Mechanism in Mobile Ad Hoc Networks,LiQing/Huazhong University of Science and Technology,0/41
  24. Key Management Based on the Threshold in Mobile Ad Hoc Network,JiangFan/Huazhong University of Science and Technology,0/71
  25. Key Management Based on Random Key-assignment in Mobile Ad Hoc Networks,ZhangQunShu/Huazhong University of Science and Technology,0/70
  26. Research of Secure Routing Protocols in Mobile Ad Hoc Networks,XuLiang/Huazhong University of Science and Technology,0/95
  27. The Research of Group Key Management in Ad Hoc Networks,WangChenChen/Shandong University,0/66
  28. Study in Secure Multiparty Computation Protocols and Typical Applications,KangBin/PLA Information Engineering University,1/132
  29. PE file -based information hiding technology research and implementation,LiuZhiTao/East China Normal University,3/184
  30. Research of Distributed Digital Signature Based on P2P Network,ChengHongFang/Anhui University of Engineering,0/45
  31. The Research and Design of Electronic Voting,HuangFuRen/University of Science and Technology of China,1/122
  32. Identity-based Key Management and Secure Routing Protocols Design in Wireless Mesh Networks,WangPengHai/PLA Information Engineering University,0/24

Total 1 Pages First Previous 1 Next Last

© 2012 www.DissertationTopic.Net  Mobile