Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2007 Issue 9
lian xiang wang yu apm: wang shang bao shui ying yong an quan de de li zhu shou
..............
page:78-79
zhu li deng ji bao hu tui jin an quan ding ji "2007 lian xiang wang yu xin xi an quan zhuan jia fu wu yue " huo dong quan guo fan wei zhan kai
..............
page:79
gao bie wang luo an quan dan bing zuo zhan rui jie wang luo gsn quan ju an quan fang an
shui jie wang luo gong si
..............
page:80
dong ruan nuo ji ya qiang qiang lian shou wei jin rong xing ye ti gong an quan jie jue fang an
..............
page:81
gao xiao jing gao " feng bao ru chong " gong ji
qian dui zhan
..............
page:82
fan la ji you jian xin ji shu
he xu tian
..............
page:83-84,90
The Attacks and Defenses of Deceit about ARP Address
HE Tie-zu;CHEN Zhi-li
..............
page:85-87
yi zhong xin de xin xi an quan xiang mu guan li ban fa
wu guang yan
..............
page:88-90
fen bu shi xi tong de an quan
li an ping
..............
page:91-92
ri zhi guan li yao guo san dao " jian "
rsa xin xi an quan shi ye bu ;emc xin xi an quan shi ye bu
..............
page:77
duo jiao du de nei wang an quan guan li ti xi da jian lv meng ke ji " ju zhen " sheng ji ban ben xin te xing fen xi
xiao wei chun
..............
page:75-76
an quan jin jie h3c fa bu ispn
zhao fu qiang
..............
page:74,76
qing ting secure computing guan yu an quan li nian de xin sheng yin
zhao fu qiang
..............
page:73,76
wang yin an quan : ji shu shou duan yu ti gao yi yong xing bing zhong
duan hong
..............
page:72
sophos: zhuan zhu yu qi ye ji an quan
duan hong
..............
page:71-72
check point zhu zhang jia mi ji shu pei he fang wen kong zhi
duan hong
..............
page:70
you yi zhong fu wu jiao yuan duan ding zhi tuo guan fu wu
duan hong
..............
page:69-70
wei yi dong dian shi yin le he shi pin ti gong shu zi bao hu
safenet gong si
..............
page:68
an quan dao di you duo quan fang qi ming xing chen shou xi zhan lue guan pan zhu ting
chen dong yu
..............
page:67-68
shi jia zhuang shang ye yin xing shu ju ping tai she ji fang an
du xiao jie ; ren xing wei
..............
page:65-66
zu bo ji shu yu dian li mpls/vpn cheng yu wang
li yi bing
..............
page:62-64
xu ni zhuan yong wang vpn zai qi ye ban gong zhong de ying yong
chen xu
..............
page:59-61
Research of Risk Analysis and Safety Tactics about Aeronautical Material Management Information System
LIU Chen-yu;LI Ze;LI Wei-ling
..............
page:56-58
IPv6 Technology and Its Military Application
SONG Guang-shou;LI Jian;ZHANG Lei
..............
page:54-55,58
A New Method Used for Network Layer Topology Discovery Based on SNMP
LIU Hai-hua;NI Shao-quan;WANG Ping-ping
..............
page:52-53
Color image watermark algorithm based on integer wavelet transform
zeng xiang hui ; xiao zuo ; feng huai cheng ; huang cai yun
..............
page:50-51
com+/web service fen bu shi xi tong de an quan wen ti
wang kai
..............
page:46-49
Research of A integrate Event Correlation Techniques in Network Fault Management
WANG Ping-ping;MA Yong-qiang;LIU Hai-hua
..............
page:43-45
A Multi-proxy Multi-signature Signature based on Elliptic Curves
SHI Rong-hua;BAO Qin-qin
..............
page:1-3
IMPLEMENTING SEPARATION OF DUTY IN ROLE-BASED ACCESS CONTROL SYSTEM
ZHANG Yan-yan
..............
page:4-7
A Distributed And Multi-strategy Disaster Tolerant System For Database System
LUO Zu-mai;LIU Xiao-jie;LI Tao;LU Zheng-tian;WANG Yu-wen;ZHANG Ding
..............
page:8-10,21
The design and implementation of a database devastation system with multi-strategy
DONG Cheng-xi;LIU Xiao-jie;LI Tao;LU Zheng-tian;WANG Yu-wen;CHEN En
..............
page:11-13
Principles and Key Technologies of Voiceprint Recognition System
ZHU Hao-bing;GUO Dong-hui
..............
page:14-17
Survey of Audio Watermarking on Wavelet Transform
ZHAO Hong;CUI Yong-rui;ZHEN Su-e
..............
page:18-21
Research of Java Obfuscating Algorithms
WANG De-guang;ZHAN Xiao-juan
..............
page:22-24,37
Hybrid Network Security Management Platform Architecture Design
LIU Bin
..............
page:25-27
A Survey of Computer Regular Vulnerability Assessment
LIANG Zhi-guo;WANG Meng;DING Tian-chang;XU Rong-sheng
..............
page:28-30
The Survey Of Digital Watermarking Technique For Video
TANG Songs-heng;DONG Ying
..............
page:31-33,45
Semantic Web Security Based on RB_RBAC
LIU Shu-quan;LIU Tai-kang;JIANG Yun;WANG Li
..............
page:34-37
Novel Detection Algorithms for BMP Steganography Images
WANG Li
..............
page:38-42
an quan zi xun
..............
page:93-96
ren zheng zhi li
qu ding
..............
page:97-98
yan lun
..............
page:插1