Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2012 Issue 1
A New ElGarnal Digltal Signature base on the Conic Curves over Zn
ma feng yan ; li he nan
..............
page:38-40
xin chun xi you lu
..............
page:1
Secure Routing for Wireless Sensor Networks Research
LI Zhen-shan
..............
page:52-56
2012: zi dai she bei zhi nian , da shu ju he yun jia su fa zhan
..............
page:85
scada xi tong zhu yao xin xi an quan feng xian fen xi guan yu wo guo scada xi tong xin xi an quan de yan jiu yu si kao zhi er
..............
page:9-10
check point wei qi ye an quan zhi zhao
liang guo xian
..............
page:83-84
xin xi dong tai
..............
page:14,19,23,29,45,61,69,73,78,88,96-97,99
Hardware-based Policy Control the Temperature of CPU
WEI Shao-rong
..............
page:49-51
Performance Analysis of Combined Chaotic Spreading Sequences
LU Hui-bin;FENG Zhi-peng
..............
page:26-29
shi wen xuan yi
..............
page:93-95
Data Security Protection Construction
ZHONG Zhi-gang
..............
page:70-73
jie pu wang shang yin xing an quan jie jue fang an
xi an jiao da jie pu wang luo ke ji you xian gong si
..............
page:89-91
Design and Implementation of Key Management Mechanism of IC Card Applications
WANG Zheng-yang
..............
page:79-81
The Website System Information Security Design: with a Specific Website as an Example
TAO Wei-cheng
..............
page:57-61
yin huo de fu
..............
page:98
guan yu jia qiang gong ye kong zhi xi tong xin xi an quan guan li de tong zhi gong xin bu xie [2011]451 hao
..............
page:2-3
Based on the Plan-do-check Action Cycle of Information Security Process Management
..............
page:62-64
Virtualization Security Construction Research
DIAO Yu-liang
..............
page:65-69
gong ye kong zhi xi tong an quan guan li ti xi yan jiu ics gong ye kong zhi xi tong an quan feng xian fen xi zhi er
..............
page:20-23
A High-Capacity Algorithm of DCT Steganography in Images
LIU Hu;YUAN Hai-dong;ZHANG Yan-feng
..............
page:34-37
Research on Application of CA Authentication Technology in the Tobacco Industry E-commerce
LU Wei
..............
page:74-78
scada xi tong xin xi an quan feng xian fang hu cuo shi guan yu wo guo scada xi tong xin xi an quan de yan jiu yu si kao zhi san
xu jin wei
..............
page:11-14
pplication of Information Engineering Security Surveillance on Internet of Thing
ZHANG Yun-xiao;LIU Hong-zhi
..............
page:46-48
yun qing xi jie jue fang an
..............
page:92
jin shan si you yun an quan ping tai zhu li gong kong xi tong an quan bao zhang
..............
page:24-25
On the linear relations between the keys of Combined Public Key Cryptosystem
Xiong Rong-hua;Li Zeng-xin;Yang Heng-liang;Wang Xue-jin
..............
page:30-33
rsa zhi xing zhu xi ke wei luo zhan wang 2012 nian xin xi an quan chan ye
..............
page:82,84
an quan fang hu gui fan dui gong gong jiao tong yun shu ye de ying xiang
alexander damisch
..............
page:86-88
gong ye kong zhi xi tong an quan xian zhuang yu feng xian fen xi ics gong ye kong zhi xi tong an quan feng xian fen xi zhi yi
..............
page:15-19
An Efficient Enhancement for the Security of A-SAODV Protocol
ZHOU Xia
..............
page:41-45
gong ye ling yu ji chu she shi scada xi tong jian jie guan yu wo guo scada xi tong xin xi an quan de yan jiu yu si kao zhi yi
..............
page:4-9