Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2007 Issue 10
nac, yu xu qiu tong mai bo
array networks gong si
..............page:93
qi ming xing chen : an quan guan li zhong xin zou xiang san ge wei du
qi ming xing chen gong si
..............page:90-91
xu qiu yuan yu yong hu li yi dai gei yong hu
dong ruan gong si
..............page:88-89
an quan shen ji : wu fa hui bi de an quan xin hua ti
pu xin yu
..............page:86-87
Discussion on the GAP-based Meteorological network Isolation Plan
SHENG Mei;FENG Zhi-wei;CHEN Shi-chun
..............page:81-82
Anti-jamming Measures of Software in Embeded System
BIAN Li-li
..............page:65-68
Research of IPSec Security Policy
CHEN Zhuo;ZHANG Zheng-wen
..............page:60-62
Wireless LAN(WLAN) Security Problems and Solution
LI Ji-liang
..............page:51-54
Research of security policy in database backup and restore
guo xiao xue
..............page:47-50
Practical Analysis and Study of Instruction Detection Model
WANG Cai-rong
..............page:44-46
Guard against theft and alarm system of credit card Based on CVI
DENG Ming-xing;CONG Hai-rui;WANG Weng-yuan;HUANG Hai-bin;FENG Gao-hui
..............page:102-103,105
xiao yuan wang chang jian gu zhang ji jie jue fang fa
wang zhe
..............page:104-105
shi guan xie mi pu guang tor dai li an quan wen ti
qian dui zhan
..............page:98
An Optimization Algorithm of Digital Watermarking Scaling Parameter
WANG Shu-mei;ZHAO Wei-dong;WANG Zhi-Cheng
..............page:1-4
The Introduction and Pipeline Designing Study of AES
WANG Xue-mei;SUN Xiao-dong;CHEN Hao-ming;LIU Yan-hua
..............page:5-8
Designing of Automatic Curriculum Scheduling Based on Genetic Algorithm
XU Ke-sheng;ZHANG Su-fang
..............page:9-12
Operating System Detection Based on TCP/IP and Protective Technology Research
ZHANG Zai-feng;HAN Hui-lian
..............page:18-21
rang fa gui zun cong bu zai fu za rsa envision ying yong an li
rsa,emc xin xi an quan shi ye bu
..............page:94
zheng quan he xin ye wu shu guang fang huo qiang lin wei shou ming
shu guang gong si xin xi an quan shi ye bu
..............page:96
an quan zi xun
..............page:106-111
zai bang wu yuan , zai jia wu yuan
qu ding
..............page:112-113
yan lun
..............page:114
A Simple Way of Video Capture Implementation
SHEN Xu
..............page:40-43
Study owing to that DCT region algorithmic figure watermark video frequency stream and screen stream protect method
HUANG Ruo-hong;LI Bi-xiang;SUN Jun-yi;CHEN Qi-xiang
..............page:22-26
Discusses the LAMP safe defense system
ZHOU Jian-qiao;JIANG Zhao-yaun
..............page:27-30
The Research on The Peer-To-Peer security model
ZHOU Ji;HE Qin-lu;DONG Li-li
..............page:31-33
IPSec VPN based on Secure SMS system
YANG Yan;TAN Cheng-xiang;ZHAO Hong-fu
..............page:34-36