Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2008 Issue 8
Based on the C/S and B/S mode and cross-grain reserves in the safety management of
DUAN Ai-ling;DUAN Qiong-bo
..............page:101-103
lun dian zi zheng wu fu wu wai bao mo shi xia de an quan guan li
cao wei jing ; xia ling hong
..............page:104-106
lv se wang luo an quan chan pin shi zen yang lian cheng de
fei zong lian
..............page:107-108
rang wang luo geng an quan , rang it geng lv se
duan hong
..............page:109-110
ironport: ying dui web ying yong xin tiao zhan
duan hong
..............page:110
zheng wu xin xi wang luo an quan jian she fen xi
wang yu fei
..............page:112-113
qi ye an quan jian she zhong de lou dong : ren
wu liu chun
..............page:114
Application of Trusted Computing
DONG Xiao-ning
..............page:76-79
Research and Implementation of SSO in Information Server Platform
XIE Yong;ZHANG Yi-lai;LI Hui-ying;HUANG Hua
..............page:74-75,79
Research on Realization of RBAC by UCON
SHI Yong-chang
..............page:71-73
Discussion on Computer Forensics
ZHAO Qian;CAO Tian-jie;GENG Tao
..............page:67-70
The Data Recovery Technology
WANG Chang-liang;ZHANG Chun-qin;WANG Da-wei
..............page:64-66
A new method for Intrusion Detection based on clustering and sequential exception technique
LIU Shao-hai;LIU Qing-kun;AN Na;GU Yue-ju
..............page:1-4
Audit System Based on Sequential Pattern Mining
WANG Wei;YE Shui-sheng;JIANG Ze-tao;SHU Yuan-zhong
..............page:13-15
Research and Implementation on Increasing speed of Rule-matching in Snort
WANG Zhi-qiang;WANG Meng
..............page:20-22
Realization of Based-on-Hardware IPSec VPN System
WANG Hui;BAO Yun;DU Xin-hua
..............page:26-28
A Distributed Intrusion Detection System Based on Mobile Agent
NIE Wen-mei
..............page:29-31,34
The Ameliorated Scheme for the High-Usability System in Linux
SHI Jun;XU Xiao-wei;CAI Fu-qiang;LIU xiao-jie;CHEN En
..............page:32-34
Brute force attack on block cipher algorithm SMS4 and simulation
ZHANG Li-li;QI Zhi-juan
..............page:39-41
Analysis of Distributed denial-of-service attack detection
JING Jie;EEN Xin-hua;MA Ji-xiao
..............page:42-44
The Logic Design And Research Of UBAP Authentication Protocol
YIN Run-yuan;ZHONG Zhen-hong
..............page:45-47,51
Working Principle and Security of PGP
LAI Shun-tian
..............page:48-51
Object tracking algorithm based on hue information and KALMAN
TONG Gang;CHEN Ling-zhi
..............page:52-54
Research on Random Early Detection and the Improved RED Algorithms
WANG Long-fei;ZHANG Ming
..............page:55-59
Research on the Technology of Information Hiding Based on Text Document
HAN Dong-chu;LIU Mian-fang
..............page:60-63
qu shi ke ji fa bu yun an quan ji shu jia gou
chen dong yu
..............page:115
wang luo ji quan kong zhi bu shi hao xian xiang
qian dui zhan
..............page:116
DIDS Research and Application in Campus Network
QU Xiang-wen;ZHANG Hong
..............page:96-98
A Fault Network Diagnosis Based The Analytic Hierarchy Proccssing
XU Xin-jian;ZHU Jian-hua
..............page:94-95
Study on Network Information Security Management System
WANG Hai-jun
..............page:91-93
Color Images Watermarking Technology Based On HSI Mode
ZHANG Yan-ping;LI Jian-chao;LI Wei;ZHANG Jia-peng
..............page:89-90,93
Analysis and study of Denial of Services attack for WLAN
TANG Peng-jie;LI Li
..............page:86-88
ke xin ji suan ji shu yan jiu
yang xia
..............page:80-81,85
The elements analysis of computer virus' modifying Windows OS Registry
XIE Yi-xin;SUN Le-chang
..............page:117-121
asp wang zhan de an quan guan li ji cuo shi
zhang fan
..............page:125-127
wang luo an quan jia gu ji shu fen xi
tong yong qing ; yu
..............page:128-129
an quan zi xun
..............page:130-133
he ze liang li , dou ze liang shang
qu ding
..............page:134-135
yan lun
..............page:136