Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2016 Issue 7
Research on An Efficient and Practical Cloud-based Digital Signature Scheme
ZHANG Yongqiang;LU Weilong;TANG Chunming;School of Mathematics and Information Science;Guangzhou University;Global Digital Cybersecurity Authority Co.;Ltd.;Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes;Guangzhou University;
..............page:1-6
RSSP-Ⅱ Protocol Security Analysis Based on Communicating Sequential Process Method
LU Debiao;HE Shengjiao;WANG Jian;College of Electric Information Engineering;Beijing Jiaotong University;
..............page:7-14
Research on Trust Model for Security Strength Evaluation of Cloud Computing
LIAO Ziyuan;WANG Wei;CHEN Mingzhi;College of Mathematics and Computer Science;Fuzhou University;Key Laboratory of Information Security of Network Systems in Fujian Province;61198 PLA Troops;
..............page:15-19
Research Survey on Security Issues in Cyber-Physical Systems
PENG Kunlun;PENG Wei;WANG Dongxia;XING Qianqian;School of Computer;National University of Defense and Technology;Beijing Institute of System Engineering;
..............page:20-28
Research and Design of Remote Control System of Host Resources
ZHAO Jian;ZHANG Chang;WEN Xiangdong;The PLA Information Engineering University;Shaanxi Academy of Governance;
..............page:29-34
A Binary Code Analysis of Vulnerability Scanning Method for SDN Smart Power Grid
CHEN Yingcong;CHEN Guangqing;CHEN Zhiming;WAN Neng;Guangzhou Power Supply Bureau;Guangdong Power Grid Co.;Ltd.;Beijing University of Posts and Telecommunications;
..............page:35-39
Research on Method of Android System Malware Behavior Monitoring Based on Multi-level and Cross-view Analysis
YANG Jingya;LUO Senlin;ZHU Shuai;QU Lewei;Information System and Security & Countermeasures Experimental Center;Beijing Institute of Technology;
..............page:40-46
Research on ASLR Bypass Technology Based on Arbitrary Function Address
XU Xin;ZHANG Songnian;HU Jianwei;PLA 95865;XIDIAN University;
..............page:47-52
A Performance Testing Framework of Virtual Desktop Based on User Motion Controlling Language
ZHANG Jingxuan;CHANG Jinda;GUO Dong;WANG Wei;Department of Computer Science and Engineering;Tongji University;Tongji Branch National Engineering & Technology Center of High Performance;The Key Laboratory of Embedded System and Service Computing;Ministry of Education;Tongji University;
..............page:53-60
Security Supervisory Scheme for Industrial Control Networks
CHEN Xiaobing;CHEN Kai;XU Zhen;WANG Liming;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:61-70
Research on Access Control Model Based on the Trust Value Assessment of Cloud Computing
FAN Yundong;WU Xiaoping;SHI Xiong;Department of Information Security;Naval University of Engineering;Department of Armed Police Forces;
..............page:71-77
Research on Trusted Security Host Architecture Based on Trusted Computing Base
HUANG Qiang;CHANG Le;ZHANG Dehua;WANG Lunwei;Information Assurance Technology Laboratory;
..............page:78-84
2016 nian 5 yue ji suan ji bing du yi qing fen xi
yuan jiang tao ; liu wei ;
..............page:85
2016 nian 5 yue wang luo an quan jian ce shu ju fa bu
hu jun ; gao sheng ;
..............page:88-89
wang yu dong tai
..............page:90-93