Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2008 Issue 2
mysql shu ju ku de quan xian ji qi an quan que xian
chen xiao hui ; wen jia ; deng jie ying
..............
page:82-85
an quan zi xun
..............
page:86-87
yuan zuo yi li heng he sha
qu ding
..............
page:88
yan lun
..............
page:插1
File Security System Based on Public Key Infrastructure
ZHANG Yang-wu
..............
page:79-81
Secure Web Sites Structured by ASP.NET
ZHANG De-qiang
..............
page:76-78
yao ke kao huan shi yao an quan ?
qian dui zhan
..............
page:75
check point jin rong xing ye ke hu an li
..............
page:74
protiatm: wei wang luo shen fen bao jia hu hang
..............
page:73
zhu dong shi fang yu :2008 nian hou ji bao fa
..............
page:72
ssl vpn zai nong xing si chuan sheng fen xing de ying yong an li
tan lei
..............
page:71-72
fu wu qi qun zu fang hu jie jue fang an
zhang yong bin
..............
page:69-70
shi xian he gui xing : xuan ze sim jie jue fang an de shi ge jian yi
..............
page:67-68
ying yong jiao fu sui mo pan dian : xing ye xu qiu qiang jin tui dong shi chang shui zhang chuan gao
..............
page:65-66
Constructing the Platform of Desktop Security Protection Experiment for"Information Security Techniques"Course
WANG Yong-wei;ZHANG Bin
..............
page:62-64
The Research of the Security Architecture in Electronic Commerce Platform
ZUO Ying;YIN Jian-ping
..............
page:59-61
Role creation strategy based on relationship between trust and permission
ZONG Rui;LIU Peng
..............
page:14-17
zun xun feng xian guan li gui lv , zuo hao feng xian ping gu gong zuo tan xin xi hua xiang mu an quan bao zhang xi tong jian she
ning jia jun
..............
page:1-3
Research and implement on access control for mobile business platform based on ASP
MA Xiao-dong;LIU Xian-hui;ZHAO Wei-dong
..............
page:4-6,13
Design and Implementation of an Application Level Disaster Recovery System
WAN Jin-hui;LI Tao;HU Xiao-qin;LU Zheng-tian
..............
page:7-9
Design and realization of digital network video monitor system
YANG Da-quan;XIONG Lu
..............
page:10-13
An Overview of Electronic Business Security Technology
ZENG Jian-xin;LIU Xian-feng
..............
page:55-58
The Design and Research of CA Based on Intrusion Tolerance
LIU Kun
..............
page:51-54
Study of firewall Collaborative defense technology
MIN Rui;YANG Chu-hua
..............
page:49-50,54
Study on data packet capturing
ZHOU Xian-cun;WANG Wen-lian
..............
page:45-48
USBKey enhanced FreeRadius EAP-TLS Authentication
YANG Ling-feng
..............
page:42-44
Transparency Benchmarking of Audio Watermarking Algorithms Issues
SUN Su-jing;ZHAO Cui-jian;LI Ying-hui
..............
page:39-41
A adaptive digital watermarking algorithm based on JND model
WU Kai-xing;YAN Wei-wei
..............
page:37-38
The design and implementation of Secure Auditing in Embeded System
SUN Zhuo-hai;YUAN Jia-bin
..............
page:35-36,41
Research and development of the Trusted Computing
DENG xiao-jun
..............
page:32-34
The deceptive routing algorithm of honeypot with ip monitor based on Active Network
LIN Zi-bin
..............
page:30-31
Application of Session Border Controll in NGN
YANG Da-quan;MU De-Sheng;ZUO Cong-ju
..............
page:26-29
Design and Implementation of Image Encryption Based on Logistic maps
ZHAO Fang-Zhou;ZHAO Huai-Xun;LIU Jia-Xin;LI Shuang
..............
page:23-25
Development of Extensive Streaming Media Transmission Technology
MA Hui
..............
page:21-22,25
Research and Realization of Session Defined in PKCS#11
LIU Xiao-lei
..............
page:18-20