Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2007 Issue 9
gao xiao jing gao " feng bao ru chong " gong ji
qian dui zhan
..............page:82
fan la ji you jian xin ji shu
he xu tian
..............page:83-84,90
The Attacks and Defenses of Deceit about ARP Address
HE Tie-zu;CHEN Zhi-li
..............page:85-87
yi zhong xin de xin xi an quan xiang mu guan li ban fa
wu guang yan
..............page:88-90
fen bu shi xi tong de an quan
li an ping
..............page:91-92
ri zhi guan li yao guo san dao " jian "
rsa xin xi an quan shi ye bu ;emc xin xi an quan shi ye bu
..............page:77
an quan jin jie h3c fa bu ispn
zhao fu qiang
..............page:74,76
sophos: zhuan zhu yu qi ye ji an quan
duan hong
..............page:71-72
shi jia zhuang shang ye yin xing shu ju ping tai she ji fang an
du xiao jie ; ren xing wei
..............page:65-66
zu bo ji shu yu dian li mpls/vpn cheng yu wang
li yi bing
..............page:62-64
IPv6 Technology and Its Military Application
SONG Guang-shou;LI Jian;ZHANG Lei
..............page:54-55,58
A New Method Used for Network Layer Topology Discovery Based on SNMP
LIU Hai-hua;NI Shao-quan;WANG Ping-ping
..............page:52-53
Color image watermark algorithm based on integer wavelet transform
zeng xiang hui ; xiao zuo ; feng huai cheng ; huang cai yun
..............page:50-51
Research of A integrate Event Correlation Techniques in Network Fault Management
WANG Ping-ping;MA Yong-qiang;LIU Hai-hua
..............page:43-45
A Multi-proxy Multi-signature Signature based on Elliptic Curves
SHI Rong-hua;BAO Qin-qin
..............page:1-3
A Distributed And Multi-strategy Disaster Tolerant System For Database System
LUO Zu-mai;LIU Xiao-jie;LI Tao;LU Zheng-tian;WANG Yu-wen;ZHANG Ding
..............page:8-10,21
The design and implementation of a database devastation system with multi-strategy
DONG Cheng-xi;LIU Xiao-jie;LI Tao;LU Zheng-tian;WANG Yu-wen;CHEN En
..............page:11-13
Principles and Key Technologies of Voiceprint Recognition System
ZHU Hao-bing;GUO Dong-hui
..............page:14-17
Survey of Audio Watermarking on Wavelet Transform
ZHAO Hong;CUI Yong-rui;ZHEN Su-e
..............page:18-21
Research of Java Obfuscating Algorithms
WANG De-guang;ZHAN Xiao-juan
..............page:22-24,37
A Survey of Computer Regular Vulnerability Assessment
LIANG Zhi-guo;WANG Meng;DING Tian-chang;XU Rong-sheng
..............page:28-30
The Survey Of Digital Watermarking Technique For Video
TANG Songs-heng;DONG Ying
..............page:31-33,45
Semantic Web Security Based on RB_RBAC
LIU Shu-quan;LIU Tai-kang;JIANG Yun;WANG Li
..............page:34-37
an quan zi xun
..............page:93-96
ren zheng zhi li
qu ding
..............page:97-98
yan lun
..............page:插1