Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2012 Issue 2
A Key Management Scheme based on a Two-Way Certificate Chain.
FU Hui-ming;LIU Jing-sen;HE Jing-jing
..............page:8-12
Testing and Analysis the Radiated Signal Frequency Spectrum of Wireless Keyboard
WANG Cheng-dong;LIU Tai-kang;JIANG Yun
..............page:5-7
xin xi dong tai
..............page:28,31,54,58,65,69,74,85,91,97,99
shi wen xuan yi
..............page:93-96
Design on NetFlow Traffic Probe
LI Bing-huan;DONG Yong-ji
..............page:2-4
Design and Implement of Network Course of Computer Network Security and Protection
CAI Hong-min;ZHAO Wen-guang;LI Xing-lin
..............page:62-65
A Research of P2P Network Security Issues
LI Zhen-shan
..............page:66-69
xi wang he jing yan
..............page:98
wang luo gong ji yu fang fan cuo shi cheng xian xin qu shi 2011 nian an quan hui gu yu zhan wang bao gao ti yao
bao xu hua ; wang wei dong ; li hong pei ; zhao liang
..............page:79-85
Rapid Repair for Computer Software Fault
CHEN Jing-liang;ZHANG Jin-shi
..............page:19-22
Application of the Internet of Things in the Surveillance of Generic Cabling Project
XING Gui-lin;GAO Li;LIU Hong-zhi;YUAN Zhi-qiang
..............page:45-47
Encryption Design based on SHA-1 Algorithm of FPGA
LIU Zi-meng;CHEN Xian-chao
..............page:13-15
Research on the Network Attack and Defense
ZHU Jian-Zhong
..............page:70-74
Implementation of DESL round characters search algorithm
CHEN Hai-hong
..............page:16-18
Prevention for SQL Injection
HUANG Shao-yong
..............page:75-78
wang an xin qu
..............page:1
A Research of Wireless Network Infiltration
FAN Hai-feng
..............page:42-44
ROLE-BASED ACCESS CONTROL USED IN STRUTS2
Wu Jie-ming;Wang Ji-dong
..............page:23-25
High Speed VPN Cipher Machine System Design
WANG Zhen;ZHANG Hai-yan;LI Qiang
..............page:26-28