Font Size: a A A
Keyword [Protection Profile]
Result: 1 - 5 | Page: 1 of 1
1. Research On Some Key Technologies Of Structured Protection Level Secure Operating System Development
2. Analysis On The Security Of The Off-line E-cash System
3. The Study, Based On Common Criteria Pki Export Testing
4. The Design And Implementation Of Security Evaluation Repository Based On Common Criteria
5. Design And Implemention Of A Lightweighted And Fine-grained Privacy-preserving Profile Matching Application For Mobile Social Networking In Proximity
  <<First  <Prev  Next>  Last>>  Jump to