Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2011 Issue 8
Credibility Analysis of Amazon Architecture
LIU Yang;TANG Jing;WANG Lin;HU Jie-qing
..............page:15-17,24
The Research of the Jurisdiction on Computer Economic Crime
ZHANG Yue-xian
..............page:84-86
Facebook Cassandra Architecture and Design Analysis of Credibility
LI Dai-wei;PAN Chun-di;XIA Qing-fa;ZHOU Ya-guang
..............page:11-14
The Research of PKI in the Application of Cloud Computing
LI Jian;ZHANG Ji
..............page:44-47
Network Instant Communication System Management
HAO Wen-jiang;WU Jie
..............page:61-62,75
Ten Critical Vulnerabilities Analysis Report July 2011
National Computer Networks Intrusion Protection Ce
..............page:98-99
Research on A Method of Detecting Puppet Process
FENG Tian-shu;XU Xue-dong
..............page:82-83
Research and Usage of Admission Control for Network
DAI Ming-xing;CHEN Zheng-kui
..............page:41-43
Vulnerability-based Model Checking of Security Vulnerabilities Mining Method
XU You-fu;WEN Wei-ping;WAN Zheng-su
..............page:72-75
Study on the Credibility of Micro-blog System Architecture
HAN Fu-ye;MENG Qing-xuan
..............page:18-21
The Application of Recommendation System and Research on it\'s Security
WU Cheng-gang;YANG Guang;ZHANG Xiang;WANG Xiao-huan
..............page:69-71
Security of KEELOQ Encryption Algorithm
ZHAO Feng
..............page:29-31
Study of the Reliability of Dynamo System
WANG Zhi-hui;MA Sai
..............page:8-10,14
Europe and the United States Network Telephone Monitoring Analysis of the Legal Regulation
MAMin-hu;FANG Ting;HAO Wen-jiang;XING Lei;WANG Shi-hai
..............page:87-90
3G Network Security Analysis and Research
LIU Xin
..............page:59-60
Research on Security Emergency Response System Based on Telecom Operation
ZHANG Xin-yue;LIU Zhi-yong;ZHAO Jin-yan;GUO Liang
..............page:76-78
Application of Pornography Image Detection
HUANG Juan;YANG yang;LIU Yi-ning
..............page:27-28
Study of the System Architecture of Cloud Security
BO Ming-xia;CHEN Jun;WANG Wei-qing
..............page:79-81
Computer Virus Analysis of 2011 July
LIU Wei;TAN Zi-jian
..............page:96
xin xi dong tai
..............page:100,封4
Security Problems in Three Networks Convergence and Their Solutions
XIE Feng;PENG Yong;SONG Dan-jie;GUO Xiao-jing;LI Jian
..............page:56-58
Important Role of Electron Evidence in Criminal Cases
XIE Jian-jiang;GUO Wen-ju
..............page:36-37
Information Security Products Analysis Report of 2011
GU Jian;QIU Zi-hua;ZHAO Ting
..............page:93-95
Image Encryption Algorithm Based on MD5 Algorithm and Logistic Map
LI Jin;XU Hong
..............page:25-26,47
The Analysis System of Risk Assessment Base on VPRS and Group Decision Making
CHENG Wei;ZHOU Jun;LUO Kai
..............page:54-55
Analysis and Improvement of a Typical Web Security Assessment Tool
SONG Hai-Ling;WEN Wei-Ping
..............page:65-68