Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2008 Issue 12
Development and application of CSP in smart card based mobile terminal
NIE Min;TAN Cheng-xiang;WANG Hai-hang
..............page:4
shu ju ku lou dong ping gu an quan ji shu
fei zong lian
..............page:110
Microsoft hopes free security means less malware
qian dui zhan
..............page:111
Research on the DiskGen Virus Destruction Mechanism and Cure Strategy
JIANG Guo-song;JIN Xu-wei
..............page:116
wan zhao wang luo yin you he chu ?
hang zhou hua san tong xin ji shu you xian gong si
..............page:98
Security protection of WEB site of campus network
XIONG Bang-guo;WU jian-ping;LUO zheng-mao
..............page:92
Safe attestation of ceramics industry ASP platform technology research and realization
HUANG Hua;ZHANG Yi-lai;ZHAI Yu-ming
..............page:89
IDS Design and Implement Based on Snort
LI Yang;ZHU Chong-sheng
..............page:85
xi an shi tong ji xin xi wang luo an quan tan jiu yu dui ce
chen xiao zuo ; ma jian hua
..............page:79
Key Exchange Mechanism and Its Applications
CHEN Zhuo;ZHANG Zheng-wen
..............page:73
An E-Lottery Solution Based On Several Banks Shouldering a Trusted Third Party
TANG Xi-lin;GUO Hai-gen;YANG Chang-hai
..............page:70
yi zhong ji yu nei he ding shi qi he gong zuo dui lie de linux rootkit
wang li zhi ; liu jian hui
..............page:68
Mobile-agent intrusion detection system based on computer immunity theory
LI Peng-lei;ZHANG Feng-bin
..............page:64
Research of Net-Communication with TCP/IP Protocol on Linux
DING Yan-hui;HAO Jun-shou
..............page:56
Security Research on Website Based on ASP
HUANG Xiao-hua
..............page:46
Measuring Electromagnetic Leakages from Displayer Based on EMC Anechoic Chamber
GUO Liang;LIU Tai-kang;MA Tong-bian
..............page:43
Role-based Access Control in WebGIB Systems
YUAN Yu-feng;WU dian-ping
..............page:39
RSA crypto-algorithm and Its Realization with Java
TANG Zheng-yi;HANG Zhi;SU Sai-jun
..............page:36
Design of A Personal Firewall Integrating With IPSec
ZHU Xiao-quan;FENG Mao-yan
..............page:33
The Security System Model Based On Trust-Compute
YU Huan;LIU Wu-qi
..............page:29
How to Acid New Asymmetric Encrypt Algorithm into IPSec
DENG Min-hao;WANG Hai-hang
..............page:24
Research and Security Analysis on EAP-IKEv2
WANG Ye-Cheng;TAN Cheng-Xiang
..............page:17
Design of Secured Short Message System for Wireless Business
HE Liang;TAN Cheng-xiang
..............page:10
Research And Realization Of Secure SMS System
PENG Jia;WANG Hai-hang
..............page:7