About 46 item dissertation in line with CaoZhenFu query results,the following is 1 to 50(Search took 0.038 seconds)

  1. Research on Bilinear Pairing Based Proxy Re-encryption,WangHongBing/Shanghai Jiaotong University,0/80
  2. Named Data Networking for Tactical Information Network,LinZhengSong/Shanghai Jiaotong University,0/94
  3. Biometric-based Identity Authentication Scheme,HuangJiaBin/Shanghai Jiaotong University,0/72
  4. Some Public Key Cryptography Schemes Based on Cubic Residues,XingDongSheng/Shanghai Jiaotong University,0/36
  5. Some Public Key Cryptography Schemes Based on Quartic Residues,GuoHao/Shanghai Jiaotong University,0/17
  6. The Research on Multi-Signatures, Aggregate Signatures and Their Applications,WeiLiZuo/Shanghai Jiaotong University,0/211
  7. On the Protocol and Security Problems in Delay Tolerant Networks,LiuShiJun/Shanghai Jiaotong University,0/54
  8. Study of Authentication Mode for Mobile User Smart Grid,GuoFei/Shanghai Jiaotong University,0/74
  9. Research on Delegation Based Digital Signature,CaoFeng/Shanghai Jiaotong University,0/404
  10. Proxy Re-Cryptography Revisited,ShaoJun/Shanghai Jiaotong University,2/423
  11. Research on Some Extensions of Proxy Signature,WangQin/Shanghai Jiaotong University,5/566
  12. Research on Security and Applications of Threshold Cryptosystem,ChaiZhenChuan/Shanghai Jiaotong University,7/568
  13. Design and Analysis of Cryptographic Schemes Based on Braid Groups,WangLiCheng/Shanghai Jiaotong University,4/318
  14. Study and Design of Several Proxy Cryptographic Schemes,LuRongXing/Shanghai Jiaotong University,8/402
  15. Study on Authenticated Key Exchange Protocols and Their Security Models,HuangHai/Shanghai Jiaotong University,0/356
  16. Research on Some New Threshold Encryption and Threshold Signature Schemes,YangZuoYi/Shanghai Jiaotong University,0/293
  17. Research on Cryptosystems and Key Agreement Protocols from Bilinear Pairings,WangShengBao/Shanghai Jiaotong University,3/396
  18. Research on Some Security Problems of Buyer-Seller Watermarking Protocols,ZengPeng/Shanghai Jiaotong University,0/134
  19. Non-Malleable Commitments and Non-Malleable Zero-Knowledge,ZhangZongYang/Shanghai Jiaotong University,0/78
  20. The Research of Secure Electronic Voting Scheme and Its Anonymity,PengShanShan/Shanghai Jiaotong University,0/171
  21. The Research on Fair Exchange,YeXiaoZuo/Shanghai Jiaotong University,0/125
  22. Self-Certified Short Designated Verifier Signature and Its Applications,LinZhao/Shanghai Jiaotong University,1/80
  23. Research on Proxy Re-signature,SunChaoLiang/Shanghai Jiaotong University,2/179
  24. Study on Bilateral Agent Negotiation for M-commerce and Bidding Strategy Arithmetic,LuQing/Shanghai Jiaotong University,0/61
  25. Study on CLI-Based Automatic Network Management Tool,ShenZuo/Shanghai Jiaotong University,1/49
  26. Multi - receiver signcryption security model and program,DuanZuoZuo/Shanghai Jiaotong University,0/126
  27. The Research on Security Techniques of E-Payment and E-Cash,LvMinFang/Shanghai Jiaotong University,1/446
  28. Spatial Encryption: Improvements and Applications,ZhouMuZuo/Shanghai Jiaotong University,1/40
  29. Attribute-based Encryption Algorithm,DanYiNan/Shanghai Jiaotong University,0/409
  30. Study on Attribute-based Strong Designated Verifier Signature,ShaoJian/Shanghai Jiaotong University,0/128
  31. The Study on Authenticated Tripartite Key Exchange Protocol,WangYuanYuan/Shanghai Jiaotong University,0/117
  32. Secure identity-based threshold cryptography scheme,LouShengMing/Shanghai Jiaotong University,0/73
  33. Digital Signature and Authentication for Emergent Response System of Abrupt Affairs,ZhangYang/Shanghai Jiaotong University,0/89
  34. Application and Analyses in IEEE 802.11i Based Security of Wireless Network,WuZuo/Shanghai Jiaotong University,0/192
  35. The Research and Implementation of the Dynamic Identity Authentication,YuBinBin/Shanghai Jiaotong University,2/187
  36. Research on Attribute Based Cryptosystem,LiangXiaoHui/Shanghai Jiaotong University,2/323
  37. Theory of Group Signature and Its Application,QinLiuQuan/Shanghai Jiaotong University,0/137
  38. Security Analysis of the Key Exchange Protocol Based on Thompson’s Group,ChenLe/Shanghai Jiaotong University,0/7
  39. Identity-Based Encryption, Revisited,MaRong/Shanghai Jiaotong University,0/48
  40. Research and Implementation of Commodity E-market Based on Fair Exchange,LinChenZuo/Shanghai Jiaotong University,0/46
  41. Semantic model , approximate inference algorithm and its application in a page classification,SunCongKai/Shanghai Jiaotong University,0/53
  42. Police Integrated Information System Access Control Research and Application,SongZuo/Shanghai Jiaotong University,1/67
  43. The Application of Identity-Based Signature in Self Test Platform,YanYan/Shanghai Jiaotong University,0/25
  44. Design and Safety Management of Educational Administration System in Network Education,GongXiao/Shanghai Jiaotong University,0/57
  45. Research on Identity Based Cryptography and Its Application,ZhengPeiNing/Shanghai Jiaotong University,0/36
  46. The Optimization of the Hardware Circuits of Duursma-Lee Algorithm,WangXiaoDing/Shanghai Jiaotong University,0/31

Total 1 Pages First Previous 1 Next Last

© 2012 www.DissertationTopic.Net  Mobile