Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2009 Issue 6
jian bie luo ji yu qian ming ti zhi zong shu
nan xiang hao
..............
page:1
Research on applying IF-MAP protocol to trusted network
YAO Qi
..............
page:4
A Study of Network Service Security on Red Hat Enterprise Linux
MA Yichao;YANG Xiao-bin
..............
page:8
A design and implement of Ethernet detection model Based ARP cheating
ZHANG Shuai;LIAO Shu-jian;FAN Shi-ming
..............
page:11
Research on Information Security of the Network Coding
ZHOU Xuan
..............
page:14
Security Analysis of Crypto API
PAN Guo-hua;WANG Hui-fang
..............
page:17
The Research of Security Challenges in Grid Environment
HU Bo;XU Xin-hua
..............
page:20
A Distributed Segmented Delta-CRL Mechanism
LI Chao-ling;ZHOU Yan-zhou;LI Lixin;SONG Yang
..............
page:24
A multi-receiver identity-based signcryption
CHEN Qi-feng
..............
page:27
Hijeck Linux System Cell Force Out Core Dump Hole Attack
WANG Chang;XUE Su-jing
..............
page:30
Application and Optimization of Proxy Pattern in Priviege Controlling
SHAN Shao-bo;ZAN Dong;CHEN De-li;ZHANG Yu
..............
page:33
Implementation of Network Flow Sniff Technology Based on C/S System
XUE Ai-hong
..............
page:35
Date Acquisition Module Research end Implementation of Distributed Intrusion Detection System
LIU li;HAN Li-hua
..............
page:38
The Performance Optimization of Snort-based Intrusion Detection System
HAN Zhong-qiu
..............
page:41
The Study of Analysis and Prevention Strategy to A Type of DoS Attack
LIANG Hao-ming;LIU Xiao-lin;ZHANG Gong-min
..............
page:44
DDoS Attack Principle and Defense Techniques
HU Ren-hao;QIAN Bu-ren;WU Xiao-liang;HAN Fei
..............
page:47
Based on scrambling and integration of DCT information hiding algorithm
QIN Guo-liang;ZHANG Zhi-guo
..............
page:49
Error Analysis of Digital Image Watermark Algorithm
XIE Qing
..............
page:51
Study of Distributed Firewall Based Security System
WANG Qing-hong
..............
page:54
A Application Method of GAP
XIA Han-min
..............
page:57
Research on Data Interaction Security of Smart Card
YUE Pei;SUN Dong-mei;ZHANG Da-wei
..............
page:60
Research of Network Invasion and Cheating Technology at Security of College Network
RONG Qiang
..............
page:63
Application of SSL VPN in Medium and Small Enterprise Information Management
CHEN Xiaomei
..............
page:66
The Deploy and the Integrated Approach of User Right Management Based on Secrecy and Security of Database Application
YANG in;WANG Cheng
..............
page:70
The Application and Implement of RSA Group Signature Scheme in Electronic Cash
LIAO Hai-yan;GUO Bing;FAN Ming-ming
..............
page:73
Study on the Security of E-commerce Based on Mobile Agent
LI Yun-he;WU Shan-yu;YAN Zhen-ming
..............
page:77
Research on the Solutions of Electronic Commerce System Security
WANG Liang-ying
..............
page:81
guo jia huan bao xin xi hua an quan guan li ti xi jian she tan xi
chen zuo xin
..............
page:85
Constracting VPN Long-range Meteorological Conjunction scheme Based on Filewall
GUO Yi-fei;ZHAO Bei-bei
..............
page:88
A Solution Based on CDP Data Protection
QUE Ling-yan
..............
page:91
On the Principle and Plan of Electrical information and Security System
ZHAO Zhi-yu
..............
page:93
zuo hao guo jia xin xi xi tong deng ji bao hu de ji shu zheng gai gong zuo
shen chang xiang
..............
page:97
dui ban gong ying yong zhong xin xi fang hu wen ti de shen du jie xi
li jian heng
..............
page:100
"zhong duan wu hen " gou zhu an quan de dian zi ban gong huan jing
tian qiang
..............
page:101
fortinet: li zheng wei ke hu ti gong wan shan de fu wu
chen dong yu
..............
page:103
kai fang : dai lai duo fang gong ying xin ju mian fang heng yang ke ji ceo chen long sen xian sheng
duan hong
..............
page:104
safenet zheng he aladdin ban quan he ren zheng ling yu qiang shi lian he
duan hong
..............
page:105
shuang " jian " he zuo , yu san nian que li zhong guo xin xi an quan shi chang ling dao zhe di wei
duan hong
..............
page:106
huan wang luo yi ge chun jing de kong jian jie pu shang wang xing wei yu nei rong shen ji xi tong
cheng yun peng
..............
page:107
lian xiang wang yu tui dong wang shang ban gong jin ru 3g shi dai
..............
page:109
wang shen vpn an quan wang guan fen ji bu shu zong he yun yong jie jue fang an
..............
page:110
shi wen xuan yi
qian dui zhan
..............
page:111
Enterprise Website Common Attack and Should to the Strategy
GUI You-wu;GUI You-chao
..............
page:113
Storage safety threats and Protection of hard disk under Network Environment
ZHOU Jian-jun;OHEN Li
..............
page:116
How to Search Rapidly for ARP Deceive Origin on Campus Network
YIN jun;ZHENG Guang-yong;ZHU Xian-you
..............
page:118
na chu ba dan gao zuo da de yong qi
qu ding
..............
page:121