Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2012 Issue 12
check point jie du 2013 an quan
..............
page:77-78
The Research and Application of a Vertical Search Engine in Porn sites Monitoring System
LUO Xiu-chun;SHI Xian-sheng;HAO Zhi-chao;LI Jian-qing
..............
page:9-14
Government Websites System Security Research
XIAO Mei-hua
..............
page:72-74
wang yu xing yun rong zuo wang zha chan pin shi chang ling dao jiang
..............
page:85
How to do the Software Security Testing Bestly
PAN Hao-liang;LU Xin-hua;WANG Guang-yi
..............
page:54-57
The Construction of Information Security System in Military Academies
WU Yao-wu;ZHENG Lin;BI Sheng
..............
page:68-71
Research and Implementation of Security WLAN Gateway based on EAP-TLS
ZHOU Li;TAN Fang-yong;ZHANG Yan;XU Lu-lei
..............
page:25-27,33
rang da jia sao xing liao
..............
page:90
Research and Implementation of Key Management Mechanism based on PKCS11
Meng Zhi-min;Liu Jun
..............
page:50-53
ca technologies fa bu 2013 nian wu da it qu shi yu ce
..............
page:79-80
Dynamic Bayesian Network in the Study and Application of Honeypot
BAO Wei;YU Bo
..............
page:46-49
Research and Realization of Base64 and 3DES Encryption on iOS
LIU Yang
..............
page:28-33
xin xi dong tai
..............
page:14,49,64,71,88-89,91
Security Model Study and Risk Analysis for Information Network of Electric Power
LIU Cheng
..............
page:65-67
zhen dui gao ji yin dun ji shu de gong fang ce shi
li ming jiang ; xu jin wei ; li shi yuan
..............
page:2-8
Review On Enterprise Information Security Standard Application
DING Jian;ZHOU Kai;FU Xiao-juan;SHEN Liang
..............
page:61-64
wei ruan qi dong zhen de an quan huo dong bao hu zhi shi chan quan he xiao fei zhe li yi
..............
page:86-87
Review of Information Grid Network Security Technology
QING Song
..............
page:15-19,24
The Study and Implement of the Middleware About Application Security Enhancement
WANG Wen-yu;LIU Yu-hong
..............
page:20-24
Research On The Digital Watermarking Algorithms Based On Wavelet Domain
LIU Yi
..............
page:42-45
rong he : shi xian xin yi dai men jin ji dian nao zhuo mian deng lu an quan xing de guan jian
tony ball
..............
page:75
sai men tie ke diao cha xian shi : ju bei shu zi ji neng cheng wei gong shi
..............
page:76,80
wang luo an quan li fa bao hu
..............
page:1
jie pu xin xi an quan yi ti hua ji zhong guan li xi tong (jsoc) jie shao
..............
page:81-82
A Hybrid Mutual Identity Authentication Technology with its Application
Chen Bang-chun;Huang Yu-hua;Shi Yang-yang
..............
page:34-37
Exploration of Web Automation Security Maintainence
LIANG Wan-long
..............
page:58-60
qu shi ke ji fa bu 2013 zhan lue yi xin xi an quan jin hua lun wei he xin , da zao wu jiang jie shu zi an quan shi jie
..............
page:83-84