Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2009 Issue 12
Research on Security Delegation Model in E-business
liu yi tian
..............page:72-74
shi wen xuan yi
..............page:87-88
Research and Application of Data Stream Transmission Based on WCF
huang sen ; liu feng
..............page:14-15,18
Object Migration in Java Security Problems
chen zuo
..............page:67-69
The Research of Honeypot Recognition and Anti-recognition Technology
chen chao ; miao quan xing
..............page:59-61
The File Real-time Monitoring Technology Based on the Android Smart Phone System
wang zhi guo ; hou yin tao ; shi rong gang
..............page:42-44
Research the Experiment of Network Intrusion Detection
zhan de zhao
..............page:62-64
mou cai zheng xian xiang an quan hu lian jian she fang an
zhang rui qing
..............page:83-84
Research on an Extended Model of Monitor-based Access Control Policy
liu ying ; wang zuo
..............page:38-41
ye nei dong tai
..............page:92-93
Research on Trust and Reputation Mechanism on P2P Network
zhou liang
..............page:28-29,32
Research of Rapid Recovery Technology Based on System Security
zhou lu hua ; li zuo jing
..............page:4-6
kan bu jian de xin xi an quan
..............page:94
Spam Filtering Based on BP Neural Network
guo shou tuan ; xu zhi gen
..............page:19-20,23
The Flow-match Technology in the P2P Analysis System
sun xun ; wang zhan feng ; zhou yu ming ; wang jia
..............page:30-32
A High-security Authentication Mechanism of the ATM
mou ying
..............page:70-71
yan lun
..............page:95
Survey on Fingerprint Enhancement
wu yin bo
..............page:24-27
Research of Detecting Technology of Virtual Machine
wang bao lin ; yang ming ; zhang yong hui
..............page:1-3,13
Preliminary Study of Information Security Bases on The Windows Log
wu jing ; wang kai yun ; zhao qiang ; chen zhi wen
..............page:10-13
Audio Watermarking Algorithm Based on DCT and DWT
chen xue song ; gao chang
..............page:48-50
Common Attack Means and Protect Measures on Information System Web
feng gu ; yu yong ; lin wei min
..............page:89-91