Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2010 Issue 4
Application of Group Policy to Deploy and Manage Software
tang deng ping
..............page:42-44
Gigabit Intrusion Prevention System Based on OCTEON
li qing ; feng zuo ; lin wei
..............page:21-23
Survey of P2P File Pollution end Anti-pollution
luo yi jun ; liu qiang
..............page:29-33
yan lun
..............page:96
Data Security in Publishing Edit System
kang zhao hua
..............page:78-79
The Research of Digital Signature Technology Based on Observer Synchronization with Hyperchaotic Systems
lu hui bin ; zhong xiao qing ; wang qiang ; xia cui ling
..............page:10-12
ji nian wang jiang min xian sheng
..............page:95
Analysis of Countermeasures for GPS Signal Spoofing
cui ming ; liu rui hua
..............page:55-56,59
ye nei dong tai
..............page:93-94
shi wen xuan yi
..............page:91-92
An Efficient Regular Expression Grouping Algorithm
xiao wu de
..............page:57-59
Technology and Security of Cloud Computing
lei lei ; he ming ; yao jian wen
..............page:1-3
Research on Application of a High-speed Network Intrusion Detection System
li zhi qing ; jiang ming liang
..............page:18-20
E-government Information System\'s Security Protection System
yang yu hong ; hu
..............page:72-74
Summary of Defense Mechanism on DDoS Attack
hu zun mei
..............page:64-65
A Time-stamping Application Project for Undependable-networks
chen jun feng ; chang chao wen
..............page:51-54
Study on Security Protection System of Enterprise Network based on Security Domain
zhang zuo ; feng mei ; jing xiao wei ; liu ming xin
..............page:36-38
A Trust Evaluation Model Based on Chinese Trust Pattern for Non-center Network Computing Environment
xu xiao long ; cheng chun ling ; chen dan wei ; xiong zuo yi
..............page:48-50,54
Key Technologies of P2P Network & Safety Discussion
li yin yin ; wu xiu lan ; gu tao feng
..............page:34-35
Research on NAS Stratum Security of EPS System
zuo guo dong ; wang qiong
..............page:7-9
An Improved Scheme of Segmented CRL
wang qing sheng ; chen shui xia
..............page:15-17
Application of Ameliorated Ant Colony Algorithm in QoS Multicast Routing
sun zuo ; wang xin hua ; xu jing cai
..............page:69-71