Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2011 Issue 8
The Digital Hospital Network Security and Management
LI Bei-yan
..............
page:77-79
feng he : tui guo ji biao zhun ren zheng de qian ru shi ping tai man zu an quan xu qiu
..............
page:93-94
Security Issues and Solutions of Campus Network
XU You-fang
..............
page:58-61
shi wen xuan yi
..............
page:95-97
The Study and Implement of Security Management System of Electronic File
wang wen yu ; liu yu hong
..............
page:47-52
Secure Network Solution based on Vyatta Router and VMWare Virtualization
FENG Bin;LI Jia-yuan
..............
page:7-11
she mi xin xi xi tong zhong de ying yong fu wu an quan fang hu jie jue fang an
cheng yun peng
..............
page:87-91
xin xi dong tai
..............
page:99
Network Security Attacks ARP Spoofing Case Study
XU Ping-jun
..............
page:62-64
shu ju zhong xin an quan guan li de chuang xin gou xiang
..............
page:80-81
Security Analysis of One Time Password Authentication Mechanism in Mobile Application
WANG Qin;AO Jing-hai
..............
page:16-19
Security Analysis of Web System and its Countermeasures in AMP Environment
Xia Da-wen
..............
page:33-36
Analysis and Research on Honeypot Technology
ZHENG Wen-ting;ZHANG Yan-hua;YANG Lei;PANG Ling
..............
page:37-42,52
An Analysis based on Data Mining of Abnormal Behavior in Online Securities Trading
ZHU Hong;CHEN Xing-lin
..............
page:20-24
Security Baseline in Banking Practices and Applications
WANG Yu-ping;DUAN Yong-hong;HONG Ke
..............
page:30-32,36
pki he cpk xing neng dui bi
..............
page:2-6
qu shi ke ji zhu shen zuo fa zhan yin xing gou jian quan fang wei fang bing du ti xi
..............
page:92,94
zhan bo wang luo :junos pulse zhu li yi dong an quan
..............
page:82-83
qi hua bu + zhao pin chu
..............
page:98
Study on the Technology for Detecting the Botnet
WANG Zhong-mei;YIN Xin-chun;YUAN Qiu-yu
..............
page:43-46
qiu an quan , xing xing ba !
..............
page:1
ruan jian ren zheng , an quan ren zheng xin si lu
..............
page:84-86
Network Attacks and Prevention Techniques
GAO Yong-ren
..............
page:69-72
Reputation in Technology and its Applications in the Security Field
LI Hong-pei
..............
page:25-29
Security Analysis of DNS Situation
WANG Li-xia
..............
page:65-68
Research and Implementation of ADS-B Message Decoding Algorithm based on Model S
GAO Han-kun
..............
page:12-15
Reserach and Study in PKI/CA Techical Application
HE Xiang;LI Si-wei;XUE Jian-guo
..............
page:53-57
sap xi tong an quan ji zhi yan jiu
wei jia zuo
..............
page:73-76