Security
Analysis and Improvement of Some Threshold Proxy Signature Schemes
Bilinear Pairings-based Threshold
Proxy Signature Schemes with Known Signers
A
Load Balancing Algorithm for High Speed Intrusion Detection
A
Measure and Design Method of Security Protocol
Implement
distributed parallel computing based on EJB
Stand
Space Theory and It¡¯s Application on SET Protocol
Robust
Hash Used In the Application of Digital Image Signature
An
Adaptive Digital Watermarking Algorithm Based On Wavelet Transform
Research
to An Agile Protocal for E-Commerce Security
Grid
Security and Relevant Technology
Security
Design Model of E-Government Collaborative Platform
Study
of Trust Model for Grid Security
Research
on Secure Gateway Based on Real-time Embedded Systems
Data
Encryption Algorithms for Internet-based Real-Time Systems
Research
on Grid Security for OGSA
Security
Prototype Framework Design for Open Grid Services Architecture
(OGSA)
The
Design and Implement of a Distance Education System Based on Improved
MVC Pattern
Application
of Data Mining Technology to Intrusion Detection System
Design
and Implementation of CSP Module
A
Robust Approach to Authentication of Binary Image for Multimedia
Communication
Researches
on Parallel Intrusion Detection Methods based-on Network Processor
A
General Dynamic Secret Sharing Algorithm In Distributed System
Central
3A Platform Based-on SSO
A
New Security Solution of E-Commerce Based on Web Service
Firewall
System Based on IPv4/IPv6
|