Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2011 Issue 1
ni xiang gong cheng zhi ruan jian po jie yu zhu ce ji bian xie
lv yang ; li chao
..............
page:66-69
Using PGP Software to Realize Safe Sending and Receiving eE-mail
HE Hui-ping;RONG Yan;ZHANG Lan
..............
page:52-54
Research of Cloud Computing in Mobile Communication Application
ZHANG Hai-wang;YANG Bo
..............
page:49-51
The Use of ACL Technology to Enhance Network Security
LU Jun
..............
page:55-57
Design and Study of Mine Safety Monitoring System based on Network-Control
ZHAO Qi;FENG Min
..............
page:80-82
An Authentication Model based on Modular Arithmetic
WANG Guo-bin;HUANG Yong
..............
page:17-20
jie pu wang luo cui ruo xing zhi neng ping gu xi tong
zhang yong
..............
page:89-90
zhan bo wang luo ti chu wang luo xing ye de ping tai hua zhan lue
..............
page:86-87
ji yu rfid de wu lian wang an quan xu qiu yan jiu
peng peng ; han wei li ; zhao yi ming ; zhou jian suo ; dong hao ran
..............
page:75-79
Based on Red and Black Signal on the Host Computer for Testing and Analysis of Electromagnetic Leakage
SHI Seng;LIU Tai-kang;JIANG Yun
..............
page:44-46
Keyframe Extraction in MPEG Compression Domain
QIU Duo;WANG Cheng-ru
..............
page:14-16
xin xi dong tai
..............
page:6,13,20,83,96-97,99
rsa jiang yong qing : pan dian 2010, zhan wang 2011
..............
page:88
Research on Sinkhole Attacks in Wireless Sensor Networks
TENG Li-ping;ZHANG Yong-ping
..............
page:30-34
qu shi ke ji tda zhu li chang shu shi di shui ju da fu jiang di wang luo an quan yun wei cheng ben
..............
page:91-92
shi wen xuan yi
..............
page:93-95
rang wo men de xi wang fei
..............
page:1
xin zhi yuan sai men tie ke wei lai yuan jing yi ren yu xin xi wei zhong xin
..............
page:84-85
A Video Watermarking Method on Multilevel and Multidimensional DCT Domain
LAN Peng;ZHANG Gui-cang
..............
page:21-23
duo yu de 2.0
..............
page:98
Server Virtualization Security Mechanism
PAN Shi-cheng
..............
page:58-60
ji yu mo hu ceng ci fa de wang luo tai shi liang hua ping gu fang fa
wang zhi ping ; jia yan ; li ai ping ; zhang jian feng
..............
page:61-65
Research Overview of Security Authentication Schemes in Wireless Sensor Networks
LIANG Ben-lai;JIN Zhi-ping;LIANG Zhi-biao
..............
page:35-38
Temporal Error Concealment Algorithm based on Macroblock Mode and Double-mode Overlapping
ZHANG Ya-li;FU Wei
..............
page:2-6
The Comparison of Blind Deconvolution Algorithms based on High Order Statistics
WANG Chao
..............
page:24-26
ji yu yu yi de wei fa shang wang xing wei pang lu zu duan xi tong de she ji yu shi xian
zhan gao feng ; li chao
..............
page:70-74
Research on the Security and Testing of RFID System
JIANG Fa-qun;WANG Xiao-qin;CHEN Lu-ping
..............
page:39-43
Theory and Practice of Source code Analysis
WANG Guang-wei;FAN Ming-yu
..............
page:7-10
SMB Protocol for Improving the Performance of Agent File Download
HE Wei;LV Bin;ZHOU Xiang-jun
..............
page:27-29
A New Design of Large Integer Multiplication Algorithm
ZHANG Li;ZHANG Yin-bing;LIU Hai
..............
page:11-13
A Method of Encrypting Software Sensitive Information with Image
LU Tian-qi
..............
page:47-48,51