Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2010 Issue 5
A Digital Signature Based Secure Accounting Model in P2P
zhang cheng bin ; liao zhen song
..............page:27-29
An Analysis of Distributed Alarm Integration Model
wang jing
..............page:56-58,63
Research on Technology of Watermark
wang li xia
..............page:71-73,77
Research on the Secure Transmission Mechanism of Active Network
zuo di ; jin yi fu ; zhu qi zuo
..............page:68-70
The Model of Assessment Based on Credibility of the Hierarchy
fang juan ; zeng hong li
..............page:74-77
Unknown Trojan Linux-based Detection System Research and Realization
zhang zhu ; fan ming zuo
..............page:1-3
Using Reverse Agent Technology to Protect the Web Server
zheng guang yong ; yin jun ; zhu xian you
..............page:30-32
The Implementation and Design of PKI Authentication System on Scoring System
liu bo ; liu zhi gui ; ren li xue
..............page:83-85
Desing and Implement of An Source Structure Independent Database Disaster Tolerant System
shen fei ; guo dan ; lin han zuo ; liu zhe zuo
..............page:18-20
Approach of Covert Channel Based on TCP Protocol
lv tao ; cao tian jie
..............page:51-52,55
Reversible Watermarking Algorithm of SVG Vectorgraph\'s High Capacity
ding zuo ; zuo zheng ding ; zhang chun e
..............page:24-26
Research and Improvement on ID3 Algorithm in Intrusion Detection System
liu chun yan ; di guang qun
..............page:41-44
yan lun
..............page:108
Unknown Computer Virus Detection Based on Its Behavior Sequence
zheng zhong ; wang zhi ying ; chen zuo zuo ; huang yu
..............page:4-5
Research of Internet Worm Scanning Strategies and Detection Technologies
zuo zuo ; wu hai feng ; di peng ; xu xiang tao
..............page:11-13
fu zao
..............page:107
The Design and Implementation of Network Security Management System
huang yu zuo ; zhang jian ping ; ma li
..............page:78-79,82
Application Layer Filtration Research Based on Expand Function of Iptables
hu chao qiang ; huang li bin
..............page:35-37
Creation for Firewall of Laboratory Network Using Iptables
zeng shu hong
..............page:103-104
shi wen xuan yi
..............page:94-95
hu lian wang jian guan ti xi yan jiu
chen min
..............page:80-82
jie pu fu wu qi qun zu fang hu jie jue fang an
xu jing
..............page:91-92
ye nei dong tai
..............page:105-106
Design and Realization of Traffic Statistics and Anomaly Detecting System based on Linux
luo chuan ; xin kun tang ; xin zuo ting
..............page:21-23
Design and Implementation of Web Server Deception System Based on Honeypot
wu liang yuan ; huang wen pei
..............page:33-34
Research on the Internet Viruses Defensive Strategy
jiang guo song ; gao yong mei ; wu gong cai ; liu jie
..............page:6-10
Digital Image Information Hiding Preprocessing Technology
liao zuo nan
..............page:38-40
Prevention of Cross-Site Request Forgery attacks
zhou an hui
..............page:99-102