| 1. | A collusion - resistant public - key traitor tracing scheme 加密系统的叛逆者追踪方案 |
| 2. | The realization of encryption system based on ecc and aes 相结合的加密系统的实现 |
| 3. | Impulsive control and synchronization of a new chaotic system 混沌加密系统的保密性能 |
| 4. | Can all browsers detect fraud ssl security system 是否所有浏览器均能识别ssl加密系统? |
| 5. | A blind digital signature scheme based on elliptic curve cryptosystem 以椭圆曲线加密系统 |
| 6. | A practical design of java encryption system 一个实用的加密系统的设计 |
| 7. | A soft system to prevent diskette from copying under win95 98 os 98操作系统的软盘加密系统 |
| 8. | Analysis of security and efficiency on elliptic curves cryptosystems 椭圆曲线加密系统的性能分析 |
| 9. | Let me try to bypassing encryption 让我看看能不能绕过加密系统 |
| 10. | Let me try to bypassing encryption 让我看看能不能绕过加密系统 |