Font Size: a A A
Keyword [Hash Tree]
Result: 1 - 20 | Page: 1 of 3
1. Research On Key Techniques Of Memory System Data Confidentiality And Integrity Protection
2. Research On Key Techniques Of Locator/Identifier Separation Network
3. Research On Key Technology Of Botnet Detection
4. Efficient Mining Of Association Rules In Distributed Database System
5. Design Of PKI System And Research Of Its Certificate Retraction Technology
6. Research On Security Mechanism In Database As A Service Model
7. An Efficient Broadcast Authentication Scheme For Wireless Sensor Networks
8. Mining Closed Sequential Patterns Based On Bitmap
9. Chinese Text Categorization Based On Correlation Rules Mining
10. The Performance Analysis And Simulation On Source Authentication Protocol In Multicast
11. Research And Implementation Of Delegation Mechanism In Trusted Computing Platform
12. Research On Memory Confidentiality And Integrity Protection Technology In Single Processor Architecture
13. Design And Implementation Of A Backup System Based On Data De-Duplication
14. Securit Group Data Source Authentication Protocol Based On Error-correcting Code
15. Research On The ASL-DHT Algorithm And Its Application In Data Outsourcing Model
16. Research On The Asl-dht Algorithm And Its Application In Data Outsourcing Model
17. Research On Memory Confidentiality And Integrity Protection Technology
18. Research On Subspace Clustering Algorithm Based On Finding Effective Dimension
19. Based On The Key Techniques Of Cloud Computing Data Security
20. Research On Cloud Storage Data Verification
  <<First  <Prev  Next>  Last>>  Jump to