Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2008 Issue 12
wang ji an quan de zhu yao mu biao yu zhi cheng ji shu
nan xiang hao
..............
page:1
Development and application of CSP in smart card based mobile terminal
NIE Min;TAN Cheng-xiang;WANG Hai-hang
..............
page:4
zheng zhuang shang lu , ji ji ying dui 2009 gong ji zhi nian
chen yu qi
..............
page:103
qi ye fan bing du xuan ze de si da yuan ze
..............
page:105
jump ren zheng ji fei xi tong gai shu ji xing ye ying yong
chen hong wei
..............
page:106
qi ming xing chen zhu zhong guo ren min yin xing men hu wang zhan bao ao yun xin xi an quan
..............
page:108
shen xin fu shang wang xing wei guan li she bei " ru zhu " chang jiang dian li wang luo
..............
page:109
shu ju ku lou dong ping gu an quan ji shu
fei zong lian
..............
page:110
Microsoft hopes free security means less malware
qian dui zhan
..............
page:111
Research and application of anti-virus software on Linux
CHEN Hao-hu
..............
page:113
Research on the DiskGen Virus Destruction Mechanism and Cure Strategy
JIANG Guo-song;JIN Xu-wei
..............
page:116
A SNMP BASED WORM PREVENTGING METHOD——Choke back worms with Stepless Distributed Monitor and SNMP
XU Bo;CHEN Ning-jun;SHEN Xiao-wei
..............
page:121
Virus prevention technology analysis based on network ports
YANG Yu-lan
..............
page:125
Study on Security Management of network and important MIS
huang li wen
..............
page:128
web 2.0 shi dai , ru he gei gong si de dian nao jia ba suo ? websense zhuan jia tan que bao qi ye he xin ji mi shu ju an quan de fang fan ji zhi
chen gang
..............
page:101
duo he ji shu kai chuang wan zhao an quan xin shi dai
..............
page:99
wan zhao wang luo yin you he chu ?
hang zhou hua san tong xin ji shu you xian gong si
..............
page:98
Study on Information Security Management Achitecture
GUO Wen-tao
..............
page:95
Security protection of WEB site of campus network
XIONG Bang-guo;WU jian-ping;LUO zheng-mao
..............
page:92
Safe attestation of ceramics industry ASP platform technology research and realization
HUANG Hua;ZHANG Yi-lai;ZHAI Yu-ming
..............
page:89
IDS Design and Implement Based on Snort
LI Yang;ZHU Chong-sheng
..............
page:85
Architecture of centralized account end password management system in communication enterprises
ZHU Guo-cui
..............
page:81
xi an shi tong ji xin xi wang luo an quan tan jiu yu dui ce
chen xiao zuo ; ma jian hua
..............
page:79
The Industry Chain Analysis for 3G Mobile Phone Virus
MA Xiao-yan
..............
page:76
Key Exchange Mechanism and Its Applications
CHEN Zhuo;ZHANG Zheng-wen
..............
page:73
An E-Lottery Solution Based On Several Banks Shouldering a Trusted Third Party
TANG Xi-lin;GUO Hai-gen;YANG Chang-hai
..............
page:70
yi zhong ji yu nei he ding shi qi he gong zuo dui lie de linux rootkit
wang li zhi ; liu jian hui
..............
page:68
Mobile-agent intrusion detection system based on computer immunity theory
LI Peng-lei;ZHANG Feng-bin
..............
page:64
yi zhong zhen dui rsna wu xian wang luo de an quan deng ji hui gun gong ji yan jiu
cao li
..............
page:62
An Image Authentication Algorithm based on Reversible Fragile Watermark
WU Xiao-yun
..............
page:59
Research of Net-Communication with TCP/IP Protocol on Linux
DING Yan-hui;HAO Jun-shou
..............
page:56
Network data packets interception technology and implement based on NDIS intermediate layer
PEI Lin;CAO Bin
..............
page:52
Implementation the dynamic management and monitor of enterprise system resource under windows platform based on WMI and AD service
XU Di-xin;ZHANG Zhi-bin;YANG Wen-dan
..............
page:49
Security Research on Website Based on ASP
HUANG Xiao-hua
..............
page:46
Measuring Electromagnetic Leakages from Displayer Based on EMC Anechoic Chamber
GUO Liang;LIU Tai-kang;MA Tong-bian
..............
page:43
Role-based Access Control in WebGIB Systems
YUAN Yu-feng;WU dian-ping
..............
page:39
RSA crypto-algorithm and Its Realization with Java
TANG Zheng-yi;HANG Zhi;SU Sai-jun
..............
page:36
Design of A Personal Firewall Integrating With IPSec
ZHU Xiao-quan;FENG Mao-yan
..............
page:33
The Security System Model Based On Trust-Compute
YU Huan;LIU Wu-qi
..............
page:29
How to Acid New Asymmetric Encrypt Algorithm into IPSec
DENG Min-hao;WANG Hai-hang
..............
page:24
Analysis & Design Of the Management and Monitor Platform For Mobile IPSec VPN
LIU Yong-huan;WANG Hai-hang
..............
page:21
Research and Security Analysis on EAP-IKEv2
WANG Ye-Cheng;TAN Cheng-Xiang
..............
page:17
Design and Implementation of Wireless SSL VPN
XU Mei
..............
page:14
Design of Secured Short Message System for Wireless Business
HE Liang;TAN Cheng-xiang
..............
page:10
Research And Realization Of Secure SMS System
PENG Jia;WANG Hai-hang
..............
page:7