Font Size: a A A
Keyword [hash chain]
Result: 21 - 40 | Page: 2 of 3
21. Research On Forward Security And Strong Blindness
22. A Study And Implement Of The Micropayment Scheme
23. The Research And Implementation Of Revocation Schemes For Ad Hoc Networks
24. Securit Group Data Source Authentication Protocol Based On Error-correcting Code
25. Security And Privacy Protection Research Of RFID Application System
26. The Research Of PKI Cross-Domain Bridge Trust Model Based On Validation Agent
27. Wireless Lan Authentication Mechanism
28. Based On One-way Hash Chain For Ad Hoc Network Authentication And Key Management Research
29. Research On Security Charging Protocol In Heterogeneous Wireless Networks
30. The Research Of Mobile Payment Security Protocols Based On Symmetric Cryptosystem
31. With Forward Security Proxy Blind Signature Analysis And Design
32. Research On Some Issues Of False Reports Filtering And Malicious Node Localization In Wireless Sensor Networks
33. Research On Key Management For Wireless Sensor Networks
34. The Research On RFID Mutual Authentication Protocol Based On Hash-Chain
35. Research Of Mutual Authentication Protocol For RFID Based On Hash Function And Public Key
36. Research On Interactive Security Protocol Analysis Based-on Uinversal Composable
37. Research On Security Inter-domain Routing Protocol Based On Behavior And Identity Trust
38. Research And Implementation Of PUMA Multicast Routing Protocol Based On Queue Load Perceptive And Hash Chain
39. Authentication Of Relational Query Based On Hierarchical Hash Chain
40. Key Management Schemes For Wireless Sensor Networks Based On Key Pool
  <<First  <Prev  Next>  Last>>  Jump to