Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2007 Issue 12
qu shi ke ji fa bu tis/tav 2008
..............page:79
shang wang xing wei guan li shi dai de lai lin
shen xin fu
..............page:78
The Analysis of Computer Network Emergency Response
CHEN Jin-hua
..............page:50-52
weblogic ying yong dian xing wen ti fen xi he jie jue
zhang ; guo xue feng ; jiang hong cheng
..............page:47-49
An Dynamic Key Encryption Algorithm Based on Logistic Map
LU Qiu-qin;MA Liang
..............page:41-43
RFID middleware and security solution
ZHENG Ye;WANG Dong
..............page:37-40
xp vista cun zai sui ji shu gong ji lou dong ma ?
qian dui zhan
..............page:80
Analysis and realization of the web Trojan horse
Luo Chuan;Xin Ming-ting;Ling Zhi-xiang
..............page:83-85
Technology of killing virus by hand
Li Shi-ping
..............page:86-89
The Comparison of Network Intrusion Defending Techniques
Lin Hong
..............page:93-95,97
Public transportation IC card charge system safety plan
LU Zhi-ping
..............page:96-97
an quan zi xun
..............page:98-101
ji lu 2007
qu ding
..............page:102-103
secure computing hu hang zhong yuan ji yun
secure computing gong si
..............page:77
Countermeasures and Its Analysis of Denial of Service Attack
LING Hu-jia;YIN Run-yuan
..............page:34-36
The Communications Research For Small and Medium Enterprises(SMEs)
Liang Wen-jing;Zhang Rong-bo;Qu Ya-wu
..............page:31-33
A Study of a Policy-based Ontological Model of IDS
JIANG Zong-hua
..............page:25-27,30
An Improvement of Diffie-Hellman Protocol
Li Xin
..............page:22-24
yan lun
..............page:插1
The Design and Implementation of An On-line Handwritten Signature Verification Base on Multi-matcher
ZHANG Jian-qi;LIU Man-dan;QI Zhong-ji
..............page:9-11,21
Channel Selection and Capacity analysis of Image Watermarking
YU Mei-na;SUN Jin-guang;TAO Zhi-yong
..............page:12-14
Research of Digital Watermarking for Text Document
YAN Zhi-ping;ZHU Geng-ming
..............page:15-17
Solution to IP Addresses Collision by Router Control
WANG Hong-lin
..............page:18-21
Security problem and defence strategy of computer system
WEI Nian-zhong
..............page:53-55
Overview on risk assessment in campus website
JIANG Xia-qiu
..............page:59-61
On Vocational College Campus Network
Zhouhao
..............page:62-65
dong ruan neteye dian xin ji wan zhao ddos fang hu fang an
dong ruan xin xi an quan
..............page:76-77
The Property and its Application of AHP-based User Behaviour Evaluation in Trustworthy Network
JI Tie-guo;HU Zhi-xing;TIAN Li-qin;SUN Jin-xia
..............page:1-3
ji yu duo xian cheng de wang luo ge li xi tong dai li mo kuai she ji
zhang hai yuan ; tan cheng xiang
..............page:4-5,8