Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2012 Issue 1
A New ElGarnal Digltal Signature base on the Conic Curves over Zn
ma feng yan ; li he nan
..............page:38-40
xin chun xi you lu
..............page:1
Secure Routing for Wireless Sensor Networks Research
LI Zhen-shan
..............page:52-56
check point wei qi ye an quan zhi zhao
liang guo xian
..............page:83-84
xin xi dong tai
..............page:14,19,23,29,45,61,69,73,78,88,96-97,99
Hardware-based Policy Control the Temperature of CPU
WEI Shao-rong
..............page:49-51
Performance Analysis of Combined Chaotic Spreading Sequences
LU Hui-bin;FENG Zhi-peng
..............page:26-29
shi wen xuan yi
..............page:93-95
Data Security Protection Construction
ZHONG Zhi-gang
..............page:70-73
jie pu wang shang yin xing an quan jie jue fang an
xi an jiao da jie pu wang luo ke ji you xian gong si
..............page:89-91
yin huo de fu
..............page:98
Virtualization Security Construction Research
DIAO Yu-liang
..............page:65-69
A High-Capacity Algorithm of DCT Steganography in Images
LIU Hu;YUAN Hai-dong;ZHANG Yan-feng
..............page:34-37
pplication of Information Engineering Security Surveillance on Internet of Thing
ZHANG Yun-xiao;LIU Hong-zhi
..............page:46-48
yun qing xi jie jue fang an
..............page:92
On the linear relations between the keys of Combined Public Key Cryptosystem
Xiong Rong-hua;Li Zeng-xin;Yang Heng-liang;Wang Xue-jin
..............page:30-33