Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2008 Issue 5
shui lai bao hu ni de ruan jian cheng guo
safenet gong si
..............page:82
e yi ruan jian yin cang wei xian duo duo
qian dui zhan
..............page:85
xin yi dai ru qin jian ce xi tong
liu tao
..............page:78-79
wei ruan de fu wu zhan lue
lei ao zi
..............page:73
Solid Security System of Campus Network
CHEN Yi-jun;ZHANG Xiao-rong
..............page:67-69
The Design and Implementation of Bank Video Monitoring System
HUI Wei-jun;JI Shan-bing
..............page:61-63
Brief analysis the security development of web application
ZHU Yan-hua
..............page:54-55
First step research of network's Safety
XU Jia-rui
..............page:51-53,55
A Study on Image Digital Watermark and Its Application Techniques
PENG Yu-zhong;WANG Jin-cai
..............page:45-47
Design and Implementation of a Multi-point Remote Backup System
PI Lu-lin;LIU Xiao-jie;LI Tao;ZHANG Hong-liang
..............page:3-5
Periodicity and Security Analysis of Arnold Mapping
XIE Jian-quan;XIE Qing;HUANG Da-zu
..............page:6-8
The research of SQL injection attack and prevention method in Web application
JIANG Ji-ya;LIU Tong;WANG Shu-wei
..............page:9-12
Spatial Watermarking Algorithm Based on Scrambling and Amalgamation
ZHANG Xiao-fei;WANG Jie-song
..............page:13-16
info
..............page:99-103
fang du zhe shuo
qu ding
..............page:104-105
yan lun
..............page:106
xin xi
..............page:8,12,23,30,35,57,69,77,80,84
Study On Hybrid Authentication of Mobility IP network Based on Host Identity
CAO Min;CHENG Dong-nian;WU Xi;MAO Wen-tao
..............page:21-23
Application of improved k-means clustering algorithm in intrusion detection
GU Bao-ping;GUO Hong-yan
..............page:24-26
Alarm clustering for intrusion detection systems in network
QIN Zi-yan;ZHAO Zeng-yi
..............page:27-30
Automated Intrusion Response System Based on Risk Evaluation
YAN Qing-hua
..............page:31-33
Application of intrusion detection in firewall system
ZHANG Jing
..............page:34-35
A Firewall System Based on Content-Addressable Memory and ARM
LUO Hui-qian;LIU Kai
..............page:36-38