Font Size:
a
A
A
Keyword [Protection Profile]
Result: 1 - 5 | Page: 1 of 1
1.
Research On Some Key Technologies Of Structured Protection Level Secure Operating System Development
2.
Analysis On The Security Of The Off-line E-cash System
3.
The Study, Based On Common Criteria Pki Export Testing
4.
The Design And Implementation Of Security Evaluation Repository Based On Common Criteria
5.
Design And Implemention Of A Lightweighted And Fine-grained Privacy-preserving Profile Matching Application For Mobile Social Networking In Proximity
<<First
<Prev Next>
Last>>
Jump to