Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2009 Issue 6
jian bie luo ji yu qian ming ti zhi zong shu
nan xiang hao
..............page:1
A Study of Network Service Security on Red Hat Enterprise Linux
MA Yichao;YANG Xiao-bin
..............page:8
A design and implement of Ethernet detection model Based ARP cheating
ZHANG Shuai;LIAO Shu-jian;FAN Shi-ming
..............page:11
Security Analysis of Crypto API
PAN Guo-hua;WANG Hui-fang
..............page:17
The Research of Security Challenges in Grid Environment
HU Bo;XU Xin-hua
..............page:20
A Distributed Segmented Delta-CRL Mechanism
LI Chao-ling;ZHOU Yan-zhou;LI Lixin;SONG Yang
..............page:24
A multi-receiver identity-based signcryption
CHEN Qi-feng
..............page:27
Hijeck Linux System Cell Force Out Core Dump Hole Attack
WANG Chang;XUE Su-jing
..............page:30
Application and Optimization of Proxy Pattern in Priviege Controlling
SHAN Shao-bo;ZAN Dong;CHEN De-li;ZHANG Yu
..............page:33
The Study of Analysis and Prevention Strategy to A Type of DoS Attack
LIANG Hao-ming;LIU Xiao-lin;ZHANG Gong-min
..............page:44
DDoS Attack Principle and Defense Techniques
HU Ren-hao;QIAN Bu-ren;WU Xiao-liang;HAN Fei
..............page:47
Based on scrambling and integration of DCT information hiding algorithm
QIN Guo-liang;ZHANG Zhi-guo
..............page:49
Study of Distributed Firewall Based Security System
WANG Qing-hong
..............page:54
A Application Method of GAP
XIA Han-min
..............page:57
Research on Data Interaction Security of Smart Card
YUE Pei;SUN Dong-mei;ZHANG Da-wei
..............page:60
The Application and Implement of RSA Group Signature Scheme in Electronic Cash
LIAO Hai-yan;GUO Bing;FAN Ming-ming
..............page:73
Study on the Security of E-commerce Based on Mobile Agent
LI Yun-he;WU Shan-yu;YAN Zhen-ming
..............page:77
A Solution Based on CDP Data Protection
QUE Ling-yan
..............page:91
fortinet: li zheng wei ke hu ti gong wan shan de fu wu
chen dong yu
..............page:103
shi wen xuan yi
qian dui zhan
..............page:111
Enterprise Website Common Attack and Should to the Strategy
GUI You-wu;GUI You-chao
..............page:113
How to Search Rapidly for ARP Deceive Origin on Campus Network
YIN jun;ZHENG Guang-yong;ZHU Xian-you
..............page:118
na chu ba dan gao zuo da de yong qi
qu ding
..............page:121