Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2009 Issue 3
The Design and Implementation of Computer Security Audit Server Management Subsystem
ZHOU Rui;ZHANG Sheng;WANG Gui-quang;WANG Dong-yan;ZHOU Wei;BAI Yan
..............page:73-75
yan lun
..............page:前插一
Application of Innate Immune on Windows OS Defending
TANG Wei;LIU Ying
..............page:65-68,72
Zero Watermarking Selective Authentication for Image Based on DCT Transform
ZHANG Hong-mei;HOU Zheng-feng
..............page:1-3
Design of IP Address Translation Algorithm Based on Honeyfarm Architecture
WU Liang-yuan;HUANG Wen-pei
..............page:12-14
A Portable Authentication Scheme Based on SW-TPM
DU Yu-jie;LIU Hui
..............page:78-81
Application of Wavelet Analysis in the Intrusion Detection System
ZHANG Jie;ZHANG Qian
..............page:33-34
The Implementation of SSL Man-in-the-middle Attack Using OpenSSL
CHEN Yu;JIANG Lan-fan
..............page:69-72
ye nei dong tai
..............page:112-113
Study of Web Page Protection Technique Based on Classification
ZHU Ya-xuan;GUO Xian-yong
..............page:15-17
shi wen xuan ze
..............page:107-108
The Evidences Collection and Analysis for Computer Forensics of UNIX System
ZHOU Min;GONG Dian;FU Guo-yu
..............page:21-23
yi zhong san he yi de she mi nei wang zong he qiang shen ji xi tong mo xing
wu de ; zhang xiao yang
..............page:99-100
The Analysis of Malicious Code Development Trends
YAN Bing
..............page:109-111
ying ji chu li fu wu shi jian tan suo
zhang lan
..............page:97-98
Inherits VPN in the CE in MPLS Networks
CAI Gang
..............page:82-85
Methods of Network Packets Analysis Based On J2SE
HONG Jian-qing;LU Hu
..............page:24-25,32
A Method of Extracting DoS Attack Characters Based on SNMP
HE Ying-jie;YAN Hong-shan
..............page:62-64
One-time Pad Encryption Technology Based on RSA
ZHANG Bei;SUN Shi-liang
..............page:53-55
Validation for RPC Protocol Based On Strand Space
ZHAN Yong-gang;YANG Shi-ping
..............page:4-7,14
The Research of Cell Phone Intrusion Detection System
FU De-sheng;JIANG Huai-qin
..............page:46-48,52
A New Linear Feature Detection Based on Digital Beamlet Transform
HOU A-lin;WANG Ming-ming;SHI Dong-cheng;WANG Nan;ZHANG Zhi-fang
..............page:8-11