Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2010 Issue 1
Improve the Methods of Software Business Process Testing in ROS2.1
yang ping ; wang chun zuo
..............page:42-44
wang luo an quan , ren ren you ze
..............page:104
Model Analysis and Study of Defense Technology of P2P Worm
wang li zhuang ; wang pei feng
..............page:98-101
shi wen xuan yi
..............page:96-97
P2P Scanning Strategy Based on Small World Network
li hong yan ; shi liang wu ; gu ke
..............page:39-41
Research of Chaotic Encryption Based RFID System Information Security
zhang yong ping ; wang feng jian
..............page:72-75
GDI + Application to Urban Rail Transit\'s Integrated Supervision Control System
lu qing ; he wen xue ; cheng bin
..............page:9-12
The Realization of Authentication Module in AAA Based on PKI
chen yong ; xie ji hua ; zhao wei qiang
..............page:76-78
Design Cross-domain Security Trust Relationship on SAML and X.509
chen hong tao ; ding jian li ; qi ming
..............page:28-31
ye nei dong tai
..............page:102-103
Research on the Computer Forensics Model
zhou min ; fu guo zuo ; gong jian
..............page:47-48
Multi-secret Sharing Scheme Based on BP Neural Network
wang wei
..............page:52-53,56
yan lun
..............page:105
wang luo zhan zheng xiang xian shi pu lai ( shang )
zuo bing
..............page:1-4
Research on Security Mechanism of Protocol with SNMPv3
liu yang ; ji zhong mei ; liu qi feng
..............page:32-35
The Safe Method of Wireless Local Area Network Based on L2TP
cheng sheng jun
..............page:23-25
Application of the Wavelet Transform in Processing the Finger Print Image
li qing ; wang fu ming
..............page:63-64,69
Review of Face Detection and Recognition Based on Computer Vision
xie li xin ; mou hui ; wang huan ; liu ming xia
..............page:65-69
Research Technology of Network Packet Intercepting and Sending Based on NDIS Hook
li zhi peng ; li zhou jun ; hu chao jian ; gong guang
..............page:5-8
Attribute Reduction Algorithm Based on Discernibility Matrix in the Information View
xie chen ; huang yong zhong ; shen yan bo
..............page:20-22
yi ge di cheng ben de jian dan zai bei fang an
wu fu jiang
..............page:83-85
Divestiture and Reorganization of FTP Application to Air GAP
gan ran ; yang guang ming
..............page:45-46
WLAN Security Protocols
zhang you zuo
..............page:26-27
xin xi
..............page:4,12,16,31,38,41,51,78,87,90,91,94,101