Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2007 Issue 12
qu shi ke ji fa bu tis/tav 2008
..............
page:79
shang wang xing wei guan li shi dai de lai lin
shen xin fu
..............
page:78
The Analysis of Computer Network Emergency Response
CHEN Jin-hua
..............
page:50-52
weblogic ying yong dian xing wen ti fen xi he jie jue
zhang ; guo xue feng ; jiang hong cheng
..............
page:47-49
Analysis of AES Encipher Algorithm and Its C++ Language Implementation
WU Xiao-bo
..............
page:44-46
An Dynamic Key Encryption Algorithm Based on Logistic Map
LU Qiu-qin;MA Liang
..............
page:41-43
RFID middleware and security solution
ZHENG Ye;WANG Dong
..............
page:37-40
qu shi ke ji : li yong xin yu ping gu ji shu ti sheng wang guan fang hu xiao guo
..............
page:79
xp vista cun zai sui ji shu gong ji lou dong ma ?
qian dui zhan
..............
page:80
"zhu dong fang yu " si xiang zai mu ma fang fan shang de ying yong
ruan wen feng
..............
page:81-82,92
Analysis and realization of the web Trojan horse
Luo Chuan;Xin Ming-ting;Ling Zhi-xiang
..............
page:83-85
Technology of killing virus by hand
Li Shi-ping
..............
page:86-89
The Application Tentative Idea Of Fingerprint Identification Technology Of Campus Internet
Ren Dan
..............
page:90-92
The Comparison of Network Intrusion Defending Techniques
Lin Hong
..............
page:93-95,97
Public transportation IC card charge system safety plan
LU Zhi-ping
..............
page:96-97
an quan zi xun
..............
page:98-101
ji lu 2007
qu ding
..............
page:102-103
secure computing hu hang zhong yuan ji yun
secure computing gong si
..............
page:77
Countermeasures and Its Analysis of Denial of Service Attack
LING Hu-jia;YIN Run-yuan
..............
page:34-36
The Communications Research For Small and Medium Enterprises(SMEs)
Liang Wen-jing;Zhang Rong-bo;Qu Ya-wu
..............
page:31-33
One Kind Digital Signature Pattern of Encrypting the Private Key based on the Abstract Password
ZHENG Li-ping;CHAI Zheng-yi
..............
page:28-30
A Study of a Policy-based Ontological Model of IDS
JIANG Zong-hua
..............
page:25-27,30
An Improvement of Diffie-Hellman Protocol
Li Xin
..............
page:22-24
yan lun
..............
page:插1
A Design of Key Exchange Protocol based on Elliptic Curve
CHEN Yao
..............
page:6-8
The Design and Implementation of An On-line Handwritten Signature Verification Base on Multi-matcher
ZHANG Jian-qi;LIU Man-dan;QI Zhong-ji
..............
page:9-11,21
Channel Selection and Capacity analysis of Image Watermarking
YU Mei-na;SUN Jin-guang;TAO Zhi-yong
..............
page:12-14
Research of Digital Watermarking for Text Document
YAN Zhi-ping;ZHU Geng-ming
..............
page:15-17
Solution to IP Addresses Collision by Router Control
WANG Hong-lin
..............
page:18-21
Security problem and defence strategy of computer system
WEI Nian-zhong
..............
page:53-55
Analysis on the Safety Problem of the Database in Development of E-commerce Website
WEN Rong
..............
page:56-58
Overview on risk assessment in campus website
JIANG Xia-qiu
..............
page:59-61
On Vocational College Campus Network
Zhouhao
..............
page:62-65
li yong wang luo she bei bao zhang dian li xi tong ip cheng yu wang wang luo an quan
li yi bing
..............
page:66-68
ji shu chuang xin ren cai pei yang bing zhong lian xiang wang yu lan hai zhan lue cheng xiao tu xian
duan hong
..............
page:69
an quan tai shi shi shi zhang kong qi ming xing chen zhu li guo jia dian zi zheng wu wai wang an quan
duan hong
..............
page:70
cong ddos fang hu kan hu lian wang qi ye an quan wei xie yu tong yi ying dui si lu
wang wei
..............
page:71-72
qian ru shi ruan jian de ye wu zeng chang ji hui zai na li
safenet gong si
..............
page:73
an quan fang hu yu an quan yuan cheng jie ru yi bu dao wei lian xiang wang yu fang huo qiang zai bao xian gong si zhong de ying yong
..............
page:74
lian xiang wang yu " xin xi an quan zhuan jia fu wu yue " huo dong quan guo huo re jin xing
..............
page:75
dong ruan neteye dian xin ji wan zhao ddos fang hu fang an
dong ruan xin xi an quan
..............
page:76-77
The Property and its Application of AHP-based User Behaviour Evaluation in Trustworthy Network
JI Tie-guo;HU Zhi-xing;TIAN Li-qin;SUN Jin-xia
..............
page:1-3
ji yu duo xian cheng de wang luo ge li xi tong dai li mo kuai she ji
zhang hai yuan ; tan cheng xiang
..............
page:4-5,8