Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2009 Issue 9
A Security Managnent Solution for Multicast Application Based on Linux
guo wei ; xu chun xiang
..............page:37-39
A New P2P Security Trust Management Model
wang cheng ; pang xi yu ; qin zhi wei ; wu hua
..............page:33-36
The Analysis and Implement of Snort Rules
sun li zuo ; zhu yi ning ; sun rui xuan
..............page:45-48
Intrusion Detection Model Based on Multiple Fuzzy reasoning
zuo cong na ; yin run yuan
..............page:43-44,48
The Research and Implementation of Certificate Status Inquiry Based on OCSP
zhou ru guang ; fu yun qing ; yang xiao xia
..............page:23-25
A Improved KNN Algorithm Applied to Pornographic Web Pages Filtering
kang jin feng ; wang guo ying ; liang chun ying ; tan xiao zhen
..............page:17-19,22
An Improved Risk Evaluation Method for Information System Based on Information Flow
wang min ; wu zhen ; chen yun
..............page:20-22
wang luo yu xin xi an quan shi jian ying ji chu zhi yan jiu
gong ya feng ; li ai dong
..............page:1-2,5
Design and Analysis of an Access Control Model Based on Credibility
wang yu qiao ; chang chao wen ; liu chen ; fu xiao qing
..............page:3-5
A Flow-differentiated, Multi-stepped and Layered Firewall Filtering Structure
yang zan ; cheng dong nian ; wang bao jin
..............page:6-8,11
Design and Implement of Monitor and Audit System
lou fang ; tan an fen ; chen zhi wen ; zhao wei feng
..............page:9-11
Application of Multiple Huffman Coding in Encryption
wang fang xiu
..............page:14-16
The Security of Wireless Access Based on EAP-TLS
shi ying
..............page:26-28,30
The Secure Research of Data Miningin Decision Support of Market Management
suo hong jun ; sun xiao han ; zuo jian rong
..............page:29-30
(2,2)Visual Cryptography Schemes based Halftoning
niu dong mei
..............page:53-54
Implement of Industry Information Security Based on MLS
zhan hong xia ; qiu hui
..............page:70-71
Reach and Design of Integrated Application System of Police Information
huang xue peng ; yao qiu feng
..............page:81-83
Discussion on the Network Information Security Risk Assessment Work In the Military Academy
jia wei guo ; xu hao ; wang cheng
..............page:78-80
sheng yin / shu zi
..............page:104
The Retro-Virus
..............page:103
Comparative Research of IPSec VPN and SSL VPN
zhang ai ke ; zeng chun
..............page:98-100
ye nei dong tai
..............page:101-102
A Practical Strategy for Anti-Trojan Detection
zhang rui xia
..............page:95-97
shi wen xuan yi
..............page:93-94
The Study on Active Network Programming Language PLAN-P
zhang na ; feng yun peng
..............page:60-61,64
Discussion on Early Warning Management System of IT Crisis
zhang jun ; guo hui
..............page:62-64
xin xi
..............page:16,80,87,92