Font Size: a A A
Keyword [attack]
Result: 61 - 80 | Page: 4 of 10
61. The Proofs Of PKE's Chosen Ciphertext Security And That Of 2~m-Root Identification Scheme's Security Under Concurrent Attacks
62. Cryptanalysis Of The Hash Functions RIPEMD-128 And HMAC-MD4
63. Cryptanalysis Of Hash Functions And HMAC/NMAC
64. Research On Resource Management Mechanism In Peer-to-Peer System
65. Design And Analysis Of Threshold Signature Scheme
66. Security Of Wireless Networks
67. Research On The Key Technology Of Formation And Cooperation Air-to-ground Attack's Intelligent Command And Control System
68. Research On Some Key Technologies Of Software Security
69. Study On Intelligent Decision-Making Of Air-to-Ground Attack With UCAV Teams Based On Bayesian Networks
70. Research On End-to-End Availability Problems Of Micro Communication Element System Based On Virtual Circuit
71. Research On Secure MANET Routing Protocols
72. Contributions To Several Issues Of Network Security
73. Research On Structures And Normal Forms Of Security Protocols
74. Attack Based Research On Security Analysis Of Digital Signature
75. Research On Digital Watermarking Algorithms For Images
76. A Study On Object-Monitoring-based Distributed And Collaborative Intrusion Detection
77. Extentics-based Network Security Management-related Technology
78. Digital Watermarking Robust Against Synchronization Attacks
79. Research On Protocols Of Quantum Secret Sharing: Design And Analysis
80. The Analysis And Design Of Certificateless Cryptographic Schemes And Proxy Cryptographic Schemes
  <<First  <Prev  Next>  Last>>  Jump to