Font Size: a A A
Keyword [provable security]
Result: 41 - 60 | Page: 3 of 10
41. Study On Authenticated Key Exchange Protocols And Their Security Models
42. Trusted Access In Wireless Networks Theory And Applications
43. Research On Key Technologies For Password-Authenticated Key Exchange Protocols
44. Study On Block Cipher Based Message Authentication Code
45. Design Of Adaptive Chosen Ciphertext Secure Public Key Encryption Scheme
46. Research And Design On Some Security Authentication Protocols
47. Study Of Provably Secure Public Key Cryptosystems In The Standard Model
48. Researches On Key Problems Of Provable Security Under The Random Oracle Model
49. Research On Fair Exchange Protocol And Some Key Techniques Of Mobile Digital Rights Managements
50. Research On Certificateless Public Key Cryptography Without Bilinear Pairing
51. Design And Analysis Of Authenticated Key Exchange Protocols
52. Analysis And Design Of Password Authenticated Key Exchange Protocols In The Standard Model
53. Research On The Key Escrow Problem In Identity Based Cryptosystem
54. Research On Certificateless Public Key Cryptography Based On ECC
55. Analysis And Design Of Key Exchange Protocols And Security Models
56. Research On Authentication And Key Management Techniques For Wireless Community
57. Research On Some Issues In Authenticated Key Agreement Protocols
58. Provable Secure Signcryption Related Public Key Schemes
59. FPGA Implementation Of The ECC On GF(2~(163))
60. Key Management Schemes In Identity-based Cryptosystems
  <<First  <Prev  Next>  Last>>  Jump to