Dissertation 

About 60 item dissertation in line with GuDaWu query results,the following is 1 to 50(Search took 0.029 seconds)

  1. Design and Implementation of the Inner-net Host Secrecy System,WanWenYuan/Shanghai Jiaotong University,0/10
  2. Research on Critical Technology of Attribute-Based Encryption in the Cloud Computing Environment,LiXiaoZuo/Shanghai Jiaotong University,0/183
  3. Extension on the Function of Searchable Encryption,TangYinZuo/Shanghai Jiaotong University,0/81
  4. Research on Several Issues of Searchable Encryption,LongBin/Shanghai Jiaotong University,0/116
  5. On the Novel Techniques of Differential Power Analysis on Block Cipher Circuits,YuanZuo/Shanghai Jiaotong University,0/47
  6. Differential Power Analysis of the Stream Ciphers with Filter Structure,QuBo/Shanghai Jiaotong University,0/18
  7. Research on Resistance to Side Channel Attack in Software Implemented Cryptographic System,GuXingYuan/Shanghai Jiaotong University,0/52
  8. Research on Impossible Differential Cryptanalysis and Algebraic Cryptanalysis of Some Block Ciphers,LiuYa/Shanghai Jiaotong University,0/135
  9. Research of High Performance, Low Power Design for VLIW Architecture Digital Signal Processor: Prototype, Algorithm & Implementation,LiYuFei/Shanghai Jiaotong University,0/707
  10. Research on Ecient Algorithms and Safety Foundation for Elliptic Curve Cryptosystems,GuHaiHua/Shanghai Jiaotong University,2/399
  11. Research on the Fault Analysis of Some Block Ciphers,LiZuo/Shanghai Jiaotong University,4/310
  12. Study and Design on Identity-Based Cryptosystems,RenYanLi/Shanghai Jiaotong University,4/411
  13. A Study of Precise Zero-Knowledge,DingNing/Shanghai Jiaotong University,1/229
  14. Research on the Security Technologies of Some Wireless Embedded Systems,ZhangZuoZuo/Shanghai Jiaotong University,0/507
  15. Analysis and Design of Authenticated Key Agreement Protocols,ZhaoJianJie/Shanghai Jiaotong University,0/120
  16. Research on Linear Cryptanalysis and Its Extensions,LiuZhiQiang/Shanghai Jiaotong University,0/18
  17. Research on Content Protection of Digital Television,SongYongHao/Shanghai Jiaotong University,3/160
  18. Research on Secure Transmission Technology of Video Surveillance Information,ShenKun/Shanghai Jiaotong University,2/148
  19. Study of the Techniques of Attacking and Protecting Several Internet Security Protocols,LuoDeXiang/Shanghai Jiaotong University,2/214
  20. Signal Latency Based Chip Signature Extraction Techniques with Its Secure Application,GaoXueFeng/Shanghai Jiaotong University,0/55
  21. Research on the Security Protection of Data Stored on Hard Disk,GaoWei/Shanghai Jiaotong University,8/263
  22. A Secure and Real-time Voice Transmission System: Design and Implementation,LingYu/Shanghai Jiaotong University,1/230
  23. Research on Key Techniques of Centralized Operation Control System in Maglev Transportation System,JiangHao/Shanghai Jiaotong University,1/37
  24. Program Safeguard Design and Implement for Online Game,ZhouZuoMing/Shanghai Jiaotong University,1/70
  25. Research on Public Key Cryptosystem and the Related Fault Analysis,ZhuLi/Shanghai Jiaotong University,0/117
  26. Key Recovery Schemes of Protocols Based on Subliminal Channel,LiLei/Shanghai Jiaotong University,0/37
  27. Design and Analysis of a Local Micro-Payment System,WenYuTian/Shanghai Jiaotong University,0/281
  28. A Study of Fault Analysis and Its Countermeasures,WangChao/Shanghai Jiaotong University,0/126
  29. The Design and Realization of Network Vulnerability Analysis System,GuoHong/Shanghai Jiaotong University,1/656
  30. The Research of Abnormal Netflow Based Intrusion Detection System,YuXinYu/Shanghai Jiaotong University,2/364
  31. Research on Authentication and Key Exchange Protocol for RFID System,LiZuoLi/Shanghai Jiaotong University,3/223
  32. Study of the Data Secrecy Integrated Avionics Loading and Recording System,ZhangYaLin/Shanghai Jiaotong University,0/66
  33. Risk and Economic Evaluation on Syngas Project,ChenYue/Shanghai Jiaotong University,2/170
  34. Foreign investment project approval process optimization Strategies,ZhangMin/Shanghai Jiaotong University,0/98
  35. Research on Memory Confidentiality and Integrity Protection Technology in Single Processor Architecture,ZhangJunQin/Shanghai Jiaotong University,1/31
  36. Research of Unified Authentication Platform for Online Games Industry,XuLong/Shanghai Jiaotong University,1/42
  37. Research on Some Key Techniques of Memory Security in Multiprocessor Systems,ChengTao/Shanghai Jiaotong University,0/41
  38. Study and Improvement of a Specific Open-source Implementation for DNS,TianJie/Shanghai Jiaotong University,0/144
  39. Performance Tunning and Security Analysis of Domain Name System Software UNBOUND,ZhengWei/Shanghai Jiaotong University,1/49
  40. The Analysis and Control of a Type of Software on Internet,HanJiHong/Shanghai Jiaotong University,0/145
  41. Design and Implementation of Mobile Short Message Communication System between China and Japan,LiZuoWen/Shanghai Jiaotong University,0/61
  42. Research and Analysis of UltraSurf Software by Reverse Engineering,ZhangLei/Shanghai Jiaotong University,1/201
  43. Research on the Integrity Protection of Data Stored on Hard Disk,SongNingZuo/Shanghai Jiaotong University,1/93
  44. Research, Design and Implementation of Self-Securing Disk,ZengMengZuo/Shanghai Jiaotong University,2/63
  45. Research and Analysis of FreeGate Software by Reverse Engineering,ChenFan/Shanghai Jiaotong University,2/389
  46. The Analasys and Control of Several Types of Software on Internet,DuanBing/Shanghai Jiaotong University,1/152
  47. Design and Implementation of Secure Multimedia Communication Protocol,ZhangQun/Shanghai Jiaotong University,0/101
  48. The Secure Transmission and Management of Multimedia Information,ChenWeiZuo/Shanghai Jiaotong University,2/167
  49. Algebraic Attack and Its Application on Some Lightweight Block Ciphers,GeShiJing/Shanghai Jiaotong University,3/151
  50. Power Analysis on Lightweight Block Cipher-Present,ZhangZuo/Shanghai Jiaotong University,3/269

Total 2 Pages First Previous 1 2 Next Last

© 2012 www.DissertationTopic.Net  Mobile