Font Size: a A A
Keyword [Hash function]
Result: 101 - 120 | Page: 6 of 10
101. Research On Information And Network Security Technology For Parking Management System Based On GPRS
102. Cryptanalysis Of Blue Midnight Wish Algorithm Of The Second Round Candidates Of The SHA-3
103. The Simulation And Comparison Of Bloom Filter And Its Improved Algorithms In The Distributed Environment
104. The Situation Of The Hash Function Structures And A New Design
105. Research Of Secure Multipapty Computation Protocols
106. Research And Design Of RFID Security Authentication Protocol
107. The Research Of Security And Privacy On The System Of Radio Frequency Identification
108. Research Of Hash Function Based On Multivariable Polynomials Over A Finite Field
109. Research Of Polymorphic Hash Function Based On Multivariate Polynomials
110. Application Research Of Elliptic Curves In Key Management Of WSN
111. Research Of Attack Technology Of Hash Function MD5
112. Research Of Preimage Attacks On Hash Function
113. Signature Scheme For Network Coding
114. Research On Software Watermarking Algorithm
115. The Application And Research Of Spatiotemporal Chaos Theory In Identity Authentication
116. Study And Design Of Image Chaotic Encryption Algorithms
117. Chaos-Based Hash Function And Its Application In Message Authentication
118. UHF RFID Security System Design
119. Research On Shielding Mechanism Of Short Message Spam And It's Application
120. Network Layer Software Design And Key Management Research For WirelessHART
  <<First  <Prev  Next>  Last>>  Jump to