Font Size: a A A
Keyword [cryptography.]
Result: 81 - 100 | Page: 5 of 10
81. Research On Applications Of Chaos Cryptography To Wireless Sensor Networks Security
82. Design Of Nonlinear Dynamic Filter And Its Application In Information Security
83. The Formal Study Of Secure Threshold Cryptographic Schemes
84. Studies On Identity-Based Key-Exposure Protection Mechanism
85. Research On Identity-Based Cryptography And Its Application
86. Proxy Re-Cryptography Revisited
87. A Dual-Field Algorithm For Elliptic Curve Cryptosystem And Its Hardware Implementation
88. Applications Of ID-Based Cryptography To Mobile Ad Hoc Network
89. Ergodic Matrices And Its Applications In Public Key Cryptography
90. Research On Protocols Of Quantum Secret Sharing: Design And Analysis
91. Research On Society-Oriented Digital Signature Scheme
92. Design And Analysis Of Provably Secure Authentication And Key Exchange Protocols
93. The Analysis And Design Of Certificateless Cryptographic Schemes And Proxy Cryptographic Schemes
94. Research On Pairing-based Group Cryptography
95. Research On Some Issues Of Quantum Cryptography
96. Formal Analysis And Design Of Wireless Network Protocols
97. The Research On Digital Signature Schemes
98. Study On Chaos-based Cryptography And Its Application In Secure E-mail System
99. Researches On Key Technologies In Identity-Based Cryptography And Its Applications
100. Research On Theory And Applications Of Digital Signature
  <<First  <Prev  Next>  Last>>  Jump to