Keyword [security analysis] Result: 1 - 20 | Page: 1 of 10 |
1. | Study On Security Analysis Techniques In Routing Protocols For Mobile Ad Hoc Networks |
2. | Privacy-Preserving Attribute Matchmaking In Mobile Social Networks |
3. | Research On Key Technologies Of Multi- Domain And Multi-Level Authorization Management Model Supporting Resource Management |
4. | Security Analysis Of Block Cipher |
5. | Research On Key Technologies Of Software Security Analysis Oriented Binary Code Analysis |
6. | Study On Implementation And Security Analysis For Embedded Internet |
7. | On The Design And Security Analysis Of Block Ciphers |
8. | Information Hiding |
9. | Analysis And Design Of Block Ciphers |
10. | Research On Theory And Technology Of Society-Oriented Signature |
11. | Signatures With Additional Properties And Its Applications |
12. | Research On Survivability Analysis For Network Information Systems |
13. | Security Analysis Of Trusted Platform Module And Application |
14. | Design And Analysis Of Proxy Signature And Group Signature |
15. | Research On Robust And Semi-Fragile Digital Watermark |
16. | Transmission Efficiency And Security Analysis Of Wireless Communication Systems Based On A Statistical Physics Approach |
17. | Attack Based Research On Security Analysis Of Digital Signature |
18. | Security Analysis Of Discrete Logarithm Based Cryptographic Schemes And Secure Implementation Technology |
19. | Research On Access Control Model And Security Analysis In Workflow Systems |
20. | Research On Secure Group Signature Scheme And Security Analysis |
|