Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2008 Issue 2
mysql shu ju ku de quan xian ji qi an quan que xian
chen xiao hui ; wen jia ; deng jie ying
..............page:82-85
an quan zi xun
..............page:86-87
yuan zuo yi li heng he sha
qu ding
..............page:88
yan lun
..............page:插1
File Security System Based on Public Key Infrastructure
ZHANG Yang-wu
..............page:79-81
Secure Web Sites Structured by ASP.NET
ZHANG De-qiang
..............page:76-78
yao ke kao huan shi yao an quan ?
qian dui zhan
..............page:75
fu wu qi qun zu fang hu jie jue fang an
zhang yong bin
..............page:69-70
The Research of the Security Architecture in Electronic Commerce Platform
ZUO Ying;YIN Jian-ping
..............page:59-61
Research and implement on access control for mobile business platform based on ASP
MA Xiao-dong;LIU Xian-hui;ZHAO Wei-dong
..............page:4-6,13
Design and Implementation of an Application Level Disaster Recovery System
WAN Jin-hui;LI Tao;HU Xiao-qin;LU Zheng-tian
..............page:7-9
Design and realization of digital network video monitor system
YANG Da-quan;XIONG Lu
..............page:10-13
An Overview of Electronic Business Security Technology
ZENG Jian-xin;LIU Xian-feng
..............page:55-58
Study of firewall Collaborative defense technology
MIN Rui;YANG Chu-hua
..............page:49-50,54
Study on data packet capturing
ZHOU Xian-cun;WANG Wen-lian
..............page:45-48
USBKey enhanced FreeRadius EAP-TLS Authentication
YANG Ling-feng
..............page:42-44
Transparency Benchmarking of Audio Watermarking Algorithms Issues
SUN Su-jing;ZHAO Cui-jian;LI Ying-hui
..............page:39-41
A adaptive digital watermarking algorithm based on JND model
WU Kai-xing;YAN Wei-wei
..............page:37-38
The design and implementation of Secure Auditing in Embeded System
SUN Zhuo-hai;YUAN Jia-bin
..............page:35-36,41
Research and development of the Trusted Computing
DENG xiao-jun
..............page:32-34
Application of Session Border Controll in NGN
YANG Da-quan;MU De-Sheng;ZUO Cong-ju
..............page:26-29
Design and Implementation of Image Encryption Based on Logistic maps
ZHAO Fang-Zhou;ZHAO Huai-Xun;LIU Jia-Xin;LI Shuang
..............page:23-25
Research and Realization of Session Defined in PKCS#11
LIU Xiao-lei
..............page:18-20