Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2008 Issue 9
zhong mei deng ji bao hu gong zuo de bi jiao si kao
zhao zhan sheng
..............page:前插1-3
Research on the Authentication Scheme of WiMAX
Lang Wei-min;Jiao Qiao;QI Xiang-yu;ZHANG Qin
..............page:4-7
wang luo kong bu zhu yi fen xi yu dui ce yan jiu
hao wen jiang
..............page:8-11
wang luo di shou mo xing yan jiu
jiang jian chun ; wen wei ping
..............page:15-18
hu lian wang cui ruo xing fen xi he an quan bao zhang ti xi de si kao
han ying ; zhang jian
..............page:24-26
xin xi an quan guan li xian zhuang ji ce lue yan jiu
li zhen shan
..............page:27-29
dui wang luo kong bu zhu yi de you lv : xi guo hui dui ci de fan ying
tai la mi si rui rui ge wen ; yu peng ; jie zhi yong
..............page:54-58
ri ben xin xi an quan zhi du guan kui
wang tian hua ; wang fu qiang
..............page:58-60
she mi dan ji fang hu de an quan zhi lu
wan jun
..............page:61
it fu wu di si chan ye ?
zuo min hua
..............page:63-64
jun yong xin xi wang luo an quan jian she tiao zhan yu dui ce tan xi
liu bo ; wang shi wei
..............page:67-69
guan yu da xue sheng wang luo an quan fa lv jiao yu de si kao
li xia ; xiang xiu zhu
..............page:70-72
ke xin ji suan wen da abc
..............page:76
Research on Framework of Information classified Security Protection Capability
CHEN Xue-xiu;REN Wei-hong;XIE Chao-hai
..............page:30-32
xin xi an quan guan li shi jian tan jiu
zou xue qiang ; yang hai bo
..............page:33-35
dong tai jian xun
..............page:3,14,23,29,35,38,44
ieee802.16 an quan ren zheng xie yi de xing shi hua fen xi
fang ke ; wang rong
..............page:36-38
wang luo ru qin jian ce zhong de fen lei jue ce suan fa he xing neng ping jia yan jiu
xue yu ; zhang ying ; huang xiao yan
..............page:39-42
ji yu kerberos de gao jian rong xing qiao jie xin ren mo xing
zong rui ; liu peng
..............page:42-44
Network Information Security Research
Liu Ying;Zhu HongHao
..............page:47-49