Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2012 Issue 2
Analysis and Design of Educational Administration System based on Struts Framework
WANG Na
..............
page:32-35,39
A Key Management Scheme based on a Two-Way Certificate Chain.
FU Hui-ming;LIU Jing-sen;HE Jing-jing
..............
page:8-12
Testing and Analysis the Radiated Signal Frequency Spectrum of Wireless Keyboard
WANG Cheng-dong;LIU Tai-kang;JIANG Yun
..............
page:5-7
xin xi dong tai
..............
page:28,31,54,58,65,69,74,85,91,97,99
shi wen xuan yi
..............
page:93-96
jie pu wang luo cui ruo xing zhi neng ping gu xi tong
..............
page:88-89
Design on NetFlow Traffic Probe
LI Bing-huan;DONG Yong-ji
..............
page:2-4
an quan fang hu bu rong yi si qing hu hei ke ru qin yi dao su beng de qi fa
ido sarig
..............
page:86-87
hid global zhi neng ka ji shu zai shi you tian ran qi xing ye zhong de ying yong
zhao jian bang
..............
page:92,96
Design and Implement of Network Course of Computer Network Security and Protection
CAI Hong-min;ZHAO Wen-guang;LI Xing-lin
..............
page:62-65
A Research of P2P Network Security Issues
LI Zhen-shan
..............
page:66-69
xi wang he jing yan
..............
page:98
wang luo gong ji yu fang fan cuo shi cheng xian xin qu shi 2011 nian an quan hui gu yu zhan wang bao gao ti yao
bao xu hua ; wang wei dong ; li hong pei ; zhao liang
..............
page:79-85
Rapid Repair for Computer Software Fault
CHEN Jing-liang;ZHANG Jin-shi
..............
page:19-22
A Web Page Tamper-resistant Technology Based on the Special String
ZENG Fan-tao
..............
page:40-41,44
Application of the Internet of Things in the Surveillance of Generic Cabling Project
XING Gui-lin;GAO Li;LIU Hong-zhi;YUAN Zhi-qiang
..............
page:45-47
Based on the Enterprise Network Information Platform Construction and its Authority Mechanism Establishment
TANG Song-ping
..............
page:59-61
Encryption Design based on SHA-1 Algorithm of FPGA
LIU Zi-meng;CHEN Xian-chao
..............
page:13-15
Deployment and Implementation of Traffic Control based on Panabit
HUANG Song
..............
page:29-31
Application of Application Agent System for Information Disclosure
LIN Jun
..............
page:51-54
Research on the Network Attack and Defense
ZHU Jian-Zhong
..............
page:70-74
Design And Implementation of Network Information Security Early-Warnig control systm
Guo Hong-xing
..............
page:48-50
A Resesrch of Characteristic and Judge Mechsnism of the Network of Public Opinion in Campus
MA Bin
..............
page:55-58
Implementation of DESL round characters search algorithm
CHEN Hai-hong
..............
page:16-18
qu shi ke ji : fu wu qi lou dong gong ji bao hu fang an
..............
page:90-91
The Development of Contemporary Cryptography Technology and Application in Data Security
WANG Wen-yu
..............
page:36-39
Prevention for SQL Injection
HUANG Shao-yong
..............
page:75-78
wang an xin qu
..............
page:1
A Research of Wireless Network Infiltration
FAN Hai-feng
..............
page:42-44
ROLE-BASED ACCESS CONTROL USED IN STRUTS2
Wu Jie-ming;Wang Ji-dong
..............
page:23-25
High Speed VPN Cipher Machine System Design
WANG Zhen;ZHANG Hai-yan;LI Qiang
..............
page:26-28