Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2009 Issue 10
Researches on Distributed Firewalls
chen jing ; chen hong mei ; gao han
..............page:39-40
Study and Realization of A Firewall Based on Android
wang li sheng ; ye xi zhe
..............page:36-38
Analysis About the Security of RFID
qin guo dong ; ge wei li
..............page:47-50
Research of Security on Wireless Local Area Network
zuo jin song
..............page:51-53
Multiple Pattern Matching Algorithm Based on Sequential Binary Tree
song zhi peng ; ren jia
..............page:63-65
The Security of Image-Based Watermarking
xiao jing hua ; zhang rong
..............page:66-68
A Kind of Real-time Multi-protocol Gateway and its Application
zhou qin sheng ; zhang hui yi ; wang zuo ; jin ren cai
..............page:5-7
About IT Disaster Preparedness
zuo bing
..............page:1-4
Design of Network Real-name System
fan min ; hong ling
..............page:74-75
Construction of Network Security Three-dimensional Protection System
liu shan wen ; zheng hai xin ; liu jian hong ; chen zhi feng ; bao wei ; huang hui zhen
..............page:93-96
yan lun
..............page:120
xin xi
..............page:53,84,96,104,105,113
dao ban wu ying jia
..............page:119
ye nei dong tai
..............page:117-118
Research and Design of Process Monitoring System Based on the Windows NT Platform
wang quan min ; liu yu ming ; zhu er fu ; zhou qing
..............page:111-113
Analysis on Trojan Operational Mechanism and Behavior
chen zuo zuo ; li huan zhou ; tang zhang guo ; zhong ming quan
..............page:108-110
shi wen xuan yi
..............page:106-107
Access Control Model Based on Multi-level Object
liu bo ; men tao ; tan ming jie
..............page:33-35
DNSSEC Technology and Applications Analysis
li zuo juan
..............page:27-30
CMMI-based Railway Control System Safety Assessment
zhou shi cheng
..............page:21-23
Study on Application of Kerberos in the Active Directory Domain Forest Model
gong fa gen ; he yong jun
..............page:16-20
Study on Collision Detection Algorithms Of Virtual Scene Meeting an Emergency
zhou jin guang ; li bin bing ; li jing
..............page:12-15
Study on the Multidimensional Access Control Model
zhao guang song ; xie yong qiang
..............page:8-11,30