Font Size: a A A
Keyword [Trusted Third Party]
Result: 1 - 20 | Page: 1 of 2
1. Theory And Methods Of Intrusion Tolerance: Research And Applications
2. Watermarking Protocol Based On The Semi-trusted Third Party And Its Application
3. Online Electronic Contracting System With The Trusted Third Party
4. Study On Non-repudiation Protocols And Their Applications
5. The Research And Implementation Of Secure Network Model Based On IPv6
6. Research And Design On Fair E-Payment Schemes
7. Research On Fair Exchange Of Digital Signatures
8. Design And Analysis Of Efficient, Secure And Democratic Electronic Voting Scheme
9. E-Lottery Scheme Without A Trusted Third Party
10. Mobile Agent System Based On A Trusted Third Party Security Design And Implementation,
11. Based On Fair Exchange Protocol Of E-commerce Platform
12. Design And Implementation Of A Secure And Accountable Cloud Storage Scheme Based On Trusted Third Party
13. Reputation Mechanism Model Research Based On The Trusted Third-party Recommendation
14. The Privacy Strategy In Cloud Computing Based On User Trust Hierarchy
15. The Integrity Verification Of Android Applications Model Based On Trusted Third Party
16. Design And Implementation Of A Highly Secure Electronic Voting System
17. Anonymously Keyword Search Over Encrypted Data In Cloud Computing
18. Anonymously Multiple Keyword Ranking Search Over Encrypted Data In Cloud Computing
19. Research On The Dynamic Friend Matching Based On Privacy Preserving In PMSN
20. Research On Cross-domain Access Control Model And Method In Cloud Service
  <<First  <Prev  Next>  Last>>  Jump to