About 60 item dissertation in line with GuDaWu query results,the following is 1 to 50(Search took 0.029 seconds)
- Design and Implementation of the Inner-net Host Secrecy System,WanWenYuan/Shanghai Jiaotong University,0/10
- Research on Critical Technology of Attribute-Based Encryption in the Cloud Computing Environment,LiXiaoZuo/Shanghai Jiaotong University,0/183
- Extension on the Function of Searchable Encryption,TangYinZuo/Shanghai Jiaotong University,0/81
- Research on Several Issues of Searchable Encryption,LongBin/Shanghai Jiaotong University,0/116
- On the Novel Techniques of Differential Power Analysis on Block Cipher Circuits,YuanZuo/Shanghai Jiaotong University,0/47
- Differential Power Analysis of the Stream Ciphers with Filter Structure,QuBo/Shanghai Jiaotong University,0/18
- Research on Resistance to Side Channel Attack in Software Implemented Cryptographic System,GuXingYuan/Shanghai Jiaotong University,0/52
- Research on Impossible Differential Cryptanalysis and Algebraic Cryptanalysis of Some Block Ciphers,LiuYa/Shanghai Jiaotong University,0/135
- Research of High Performance, Low Power Design for VLIW Architecture Digital Signal Processor: Prototype, Algorithm & Implementation,LiYuFei/Shanghai Jiaotong University,0/707
- Research on Ecient Algorithms and Safety Foundation for Elliptic Curve Cryptosystems,GuHaiHua/Shanghai Jiaotong University,2/399
- Research on the Fault Analysis of Some Block Ciphers,LiZuo/Shanghai Jiaotong University,4/310
- Study and Design on Identity-Based Cryptosystems,RenYanLi/Shanghai Jiaotong University,4/411
- A Study of Precise Zero-Knowledge,DingNing/Shanghai Jiaotong University,1/229
- Research on the Security Technologies of Some Wireless Embedded Systems,ZhangZuoZuo/Shanghai Jiaotong University,0/507
- Analysis and Design of Authenticated Key Agreement Protocols,ZhaoJianJie/Shanghai Jiaotong University,0/120
- Research on Linear Cryptanalysis and Its Extensions,LiuZhiQiang/Shanghai Jiaotong University,0/18
- Research on Content Protection of Digital Television,SongYongHao/Shanghai Jiaotong University,3/160
- Research on Secure Transmission Technology of Video Surveillance Information,ShenKun/Shanghai Jiaotong University,2/148
- Study of the Techniques of Attacking and Protecting Several Internet Security Protocols,LuoDeXiang/Shanghai Jiaotong University,2/214
- Signal Latency Based Chip Signature Extraction Techniques with Its Secure Application,GaoXueFeng/Shanghai Jiaotong University,0/55
- Research on the Security Protection of Data Stored on Hard Disk,GaoWei/Shanghai Jiaotong University,8/263
- A Secure and Real-time Voice Transmission System: Design and Implementation,LingYu/Shanghai Jiaotong University,1/230
- Research on Key Techniques of Centralized Operation Control System in Maglev Transportation System,JiangHao/Shanghai Jiaotong University,1/37
- Program Safeguard Design and Implement for Online Game,ZhouZuoMing/Shanghai Jiaotong University,1/70
- Research on Public Key Cryptosystem and the Related Fault Analysis,ZhuLi/Shanghai Jiaotong University,0/117
- Key Recovery Schemes of Protocols Based on Subliminal Channel,LiLei/Shanghai Jiaotong University,0/37
- Design and Analysis of a Local Micro-Payment System,WenYuTian/Shanghai Jiaotong University,0/281
- A Study of Fault Analysis and Its Countermeasures,WangChao/Shanghai Jiaotong University,0/126
- The Design and Realization of Network Vulnerability Analysis System,GuoHong/Shanghai Jiaotong University,1/656
- The Research of Abnormal Netflow Based Intrusion Detection System,YuXinYu/Shanghai Jiaotong University,2/364
- Research on Authentication and Key Exchange Protocol for RFID System,LiZuoLi/Shanghai Jiaotong University,3/223
- Study of the Data Secrecy Integrated Avionics Loading and Recording System,ZhangYaLin/Shanghai Jiaotong University,0/66
- Risk and Economic Evaluation on Syngas Project,ChenYue/Shanghai Jiaotong University,2/170
- Foreign investment project approval process optimization Strategies,ZhangMin/Shanghai Jiaotong University,0/98
- Research on Memory Confidentiality and Integrity Protection Technology in Single Processor Architecture,ZhangJunQin/Shanghai Jiaotong University,1/31
- Research of Unified Authentication Platform for Online Games Industry,XuLong/Shanghai Jiaotong University,1/42
- Research on Some Key Techniques of Memory Security in Multiprocessor Systems,ChengTao/Shanghai Jiaotong University,0/41
- Study and Improvement of a Specific Open-source Implementation for DNS,TianJie/Shanghai Jiaotong University,0/144
- Performance Tunning and Security Analysis of Domain Name System Software UNBOUND,ZhengWei/Shanghai Jiaotong University,1/49
- The Analysis and Control of a Type of Software on Internet,HanJiHong/Shanghai Jiaotong University,0/145
- Design and Implementation of Mobile Short Message Communication System between China and Japan,LiZuoWen/Shanghai Jiaotong University,0/61
- Research and Analysis of UltraSurf Software by Reverse Engineering,ZhangLei/Shanghai Jiaotong University,1/201
- Research on the Integrity Protection of Data Stored on Hard Disk,SongNingZuo/Shanghai Jiaotong University,1/93
- Research, Design and Implementation of Self-Securing Disk,ZengMengZuo/Shanghai Jiaotong University,2/63
- Research and Analysis of FreeGate Software by Reverse Engineering,ChenFan/Shanghai Jiaotong University,2/389
- The Analasys and Control of Several Types of Software on Internet,DuanBing/Shanghai Jiaotong University,1/152
- Design and Implementation of Secure Multimedia Communication Protocol,ZhangQun/Shanghai Jiaotong University,0/101
- The Secure Transmission and Management of Multimedia Information,ChenWeiZuo/Shanghai Jiaotong University,2/167
- Algebraic Attack and Its Application on Some Lightweight Block Ciphers,GeShiJing/Shanghai Jiaotong University,3/151
- Power Analysis on Lightweight Block Cipher-Present,ZhangZuo/Shanghai Jiaotong University,3/269
Total 2 Pages First Previous 1 2 Next Last
© 2012 www.DissertationTopic.Net Mobile
|