Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2016 Issue 2
xin chun he ci
hu chuan ping ;
..............page:1
Design on Data Access Control Scheme for Cloud Storage Based on CP-ABE Algorithm
CHENG Sijia;ZHANG Changhong;PAN Shuaiqing;Department of Information Security;Navy University of Engineering;
..............page:1-6
gu wen guan dian
..............page:2-10
Research on Protection Scheme for Malicious USB Storage Devices in APT
TAN Cheng;DENG Ruyi;WANG Lina;MA Jing;School of Computer;Wuhan University;Key Laboratory of Information Security Technology;
..............page:7-14
Design and Implementation of Privilege Escalation Attack Detecting System Based on Android Platform
ZHANG Tao;PEI Bei;WEN Weiping;CHEN Zhong;School of Electronics Engineering & Computer Sciences;Peking University;Key Lab of Information Network Security of Ministry of Public Security;School of Software and Microelectronics;Peking University;
..............page:15-21
A Method of Intrusion Detection in Wireless Sensor Network Based on Similarity Algorithm
ZHONG Dunhao;ZHANG Dongmei;ZHANG Yu;College of Computer Scicence;Beijing University of Posts and Telecommunications;
..............page:22-27
ECC Scanning Attack Based on Grover Algorithm
CHEN Yuhang;JIA Huihui;JIANG Liying;WANG Chao;Key Laboratory of Special Fiber Optics and Optical Access Networks;Ministry of Education;Shanghai University;Testing Center of the Third Research Institute of Ministry of Public Security;Department of Computer & Information Sciences;Temple University;
..............page:28-32
Research on the Model of Cloud Computing Trust Management Based on Evaluation Credibility
LIAO Ziyuan;CHEN Mingzhi;DENG Hui;College of Mathematics and Computer Science;Fuzhou University;Key Lab of Information Security of Network System in Fujian Province;Huainan Municipal Public Security Bureau;
..............page:33-39
Research and Implement on Network Visual Analytic System Based on TcpFlow
MENG Hao;WANG Jinsong;HUANG Jingyun;NAN Huirong;School of Computer and Communication Engineering;Tianjin University of Technology;Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology;National Engineering Laboratory for Computer Virus Prevention and Control Technology;
..............page:40-46
A Framework of Privacy Metric in LBS Combining Query Privacy with Location Privacy
ZHU Yijie;PENG Changgen;LI Jiashuai;MA Haifeng;College of Computer Science & Technology;Guizhou University;Institute of Cryptography & Data Security;Guizhou University;College of Science;Guizhou University;
..............page:47-53
A Detecting System for Android Malicious Behavior Based on Binder Information Flow
LI Guizhi;HAN Zhen;ZHOU Qihui;WANG Yazhe;School of Computer and Information Technology;Beijing Jiaotong University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:54-59
IT Assets Safety Monitoring System Based on Huge Data
WANG Hongkai;ZHENG Shengjun;GUO Longhua;LIU Yun;Information and Telecommunication Branch of State Grid Zhejiang Electric Power Company;Beijng Guo Dian Tong Network Technology Co.;Ltd;School of Electronic Information and Electric Engineering;Shanghai Jiao Tong University;State Grid JIBEI Electric Power Company;
..............page:60-65
Research and Analysis on the Novel SQL Injection and Defense Technique
LI Xin;ZHANG Weiwei;SUI Zichang;ZHENG Lixin;College of Engineering;Huaqiao University;Information and Computer Engineering College;Northeast Forestry University;
..............page:66-73
2015 nian 12 yue ji suan ji bing du yi qing fen xi
zhang rui ; liu wei ;
..............page:74
2015 nian 12 yue wang luo an quan jian ce shu ju fa bu
zhang hong ; li ting ;
..............page:77-78