Font Size: a A A
Keyword [random oracle model]
Result: 81 - 100 | Page: 5 of 7
81. Two Kinds Of Proxy Signature Schemes And Application
82. Research And Application Of Partially Blind Signature
83. Study On Theory And Application Technology Of Digital Signature And Authentication
84. Study On Identity/Attribute-based Encryption For Cloud Computing
85. Research On Several Issues Of Proxy Re-encryption
86. User Authentication And Key Agreement Protocols For Mobile Environments
87. Design And Analysis Of Cryptosystem For The Internet Of Things
88. Research On Identity-based Encryption Without Pairings
89. Research Of Verifiable Secret Sharing Scheme
90. Analysis And Design Of Certificateless Signcryption Scheme
91. Researches On Proxy ReEncryption In Cloud Computing
92. The Research Of Authenticated Key Agreement Protocol For Mobile Network
93. The Analysis Of Certificateless Digital Signature
94. Research On Anonymous Identity-Based Broadcast Encryption
95. Research On Provably Secure Certificateless Signature Schemes
96. Verifiable Public Key Certificateless Public Key Cryptosystem
97. Provably Secure Aggregate Signature And Application
98. The Analysis And Design Of Proxy Signature
99. The Design Of The Two Digital Signature Schemes
100. Research On Authentication Key Establishment Protocols Under Mobile Client-Multi-Server Environment
  <<First  <Prev  Next>  Last>>  Jump to