Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2009 Issue 12
Research on Security Delegation Model in E-business
liu yi tian
..............
page:72-74
Research of the Financial Database Backup Strategies based on SQL Server
zhang ke you
..............
page:57-58,64
shi wen xuan yi
..............
page:87-88
Research and Application of Data Stream Transmission Based on WCF
huang sen ; liu feng
..............
page:14-15,18
Object Migration in Java Security Problems
chen zuo
..............
page:67-69
The Research of Honeypot Recognition and Anti-recognition Technology
chen chao ; miao quan xing
..............
page:59-61
The Application of VPN in Small and Medium Enterprise EPR System Safety Network Architecture
zhang yu zhen
..............
page:77-79
The File Real-time Monitoring Technology Based on the Android Smart Phone System
wang zhi guo ; hou yin tao ; shi rong gang
..............
page:42-44
Multicast Routing Optimization Based on Ouantum Particle Swarm Algorithm
ding zuo ; chen li qing
..............
page:7-9
Bit Commitment Based on Information Theoretic Security
hong yan
..............
page:33-34
Research the Experiment of Network Intrusion Detection
zhan de zhao
..............
page:62-64
Design and Implementation of the Module of Device Detection in Safe Connect Platform
tao xing pu
..............
page:65-66
ding pu nei wang min gan shu ju an quan de san wei fang hu
chen guang hui
..............
page:86
mou cai zheng xian xiang an quan hu lian jian she fang an
zhang rui qing
..............
page:83-84
shu ju hui fu ji shu cheng wei dian zi qu zheng de he xin ji shu
wang xiao qiang
..............
page:75-76
Research on an Extended Model of Monitor-based Access Control Policy
liu ying ; wang zuo
..............
page:38-41
Research on CTCS-3 Train Control System Test Sequence Auto-generation
guo qing cheng
..............
page:16-18
ye nei dong tai
..............
page:92-93
blue coat: jia qiang zhu dong bao hu , di yu web wei xie
..............
page:80
Research on Trust and Reputation Mechanism on P2P Network
zhou liang
..............
page:28-29,32
Research of Rapid Recovery Technology Based on System Security
zhou lu hua ; li zuo jing
..............
page:4-6
Advanced Encryption Standard AES process analysis and to crack the of thinking
du chang zuo
..............
page:54-56
kan bu jian de xin xi an quan
..............
page:94
An Algorithm of the Blind Digital Audio Watermarking Based on Energy Analysis of Wavelet Coefficient
ren ke qiang ; li hui huan ; cao feng
..............
page:45-47
Spam Filtering Based on BP Neural Network
guo shou tuan ; xu zhi gen
..............
page:19-20,23
etoken da zao shen fen yan zheng he mi ma guan li an quan da ping tai
..............
page:81-82
Network Authentication Model based on Signature Verification
geng hui
..............
page:35-37
The Flow-match Technology in the P2P Analysis System
sun xun ; wang zhan feng ; zhou yu ming ; wang jia
..............
page:30-32
A High-security Authentication Mechanism of the ATM
mou ying
..............
page:70-71
yan lun
..............
page:95
Survey on Fingerprint Enhancement
wu yin bo
..............
page:24-27
Research of Detecting Technology of Virtual Machine
wang bao lin ; yang ming ; zhang yong hui
..............
page:1-3,13
Preliminary Study of Information Security Bases on The Windows Log
wu jing ; wang kai yun ; zhao qiang ; chen zhi wen
..............
page:10-13
yi zhong wang luo ge li huan jing xia shu ju ku tong bu fang fa de shi jian
he wei ; hao ya qing
..............
page:21-23
shan shi wang ke duo he an quan wang guan cheng gong an li mou shi quan li yang guang zheng wu wang sheng ji gai zao
..............
page:85
The Analysis and Improvement of Security Routing Protocol in Ad Hoc Networks
ji zu qin
..............
page:51-53,56
Audio Watermarking Algorithm Based on DCT and DWT
chen xue song ; gao chang
..............
page:48-50
Common Attack Means and Protect Measures on Information System Web
feng gu ; yu yong ; lin wei min
..............
page:89-91