Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2012 Issue 7
ying zai chuang xin
..............
page:1
cpk si yue wang shang fen fa xie yi
..............
page:2-3
xin xi dong tai
..............
page:3,30,35,46,60,98,100
Design and Implementation of a Remote File Backup System on Android Phone
MA Lian-zhi;YANG Pin;WANG Zhe
..............
page:4-7
Hardware Implementation Analysis and Design of AES Algorithm
GUO Jian-jun;LIU Chang-ming;SHI Ying;LU Xia;ZHANG Jian
..............
page:8-12
An Improvement Method to Implement the DES(Data Encryption Standard) Encryption Algorithm
ZHOU Wen-ting;MA Feng-wei;KONG Qing
..............
page:13-16
Encode and Decode of Turbo code Base on Syndromes
ZHANG Ning;GUO Da-bo;LIU Gang;ZHANG Yan-huang
..............
page:17-20
Comparison of Several Hard Disk Data Protection and its Achievement
ZHU Xin-Liang
..............
page:66-68,71
An Improved Strategy for Intranet Security Based On Two Firewalls
Hou Guo-chao
..............
page:36-38
Research of RSA Digital Signatures Algorithm in the E-Process of Information Project Surveillance
LIU Hong-zhi;LI Hong;LIU Xuan-xu
..............
page:21-24
Enterprise Sensitive Data Protection Strategy based on ORACLE
ZHU De-qiao
..............
page:69-71
Local Area Network Centralized Management of Safety Protection System Research
ZHOU Hong-ying;NIE Yuan-ming;WANG Xiao-yang
..............
page:72-75
Design and Application for WLAN
SUN You-ming
..............
page:76-78
An New Security Vulnerability Detection Method for Protocol Implementation
Li Zhuo-Jun
..............
page:79-82
Security Analysis and Defend Strategy for Enterprise Network
LIU Ya-li;DENG Gao-feng
..............
page:83-85
Application of Matrix Model in Blind Recognition of Block Code
DING Yu
..............
page:39-42
The Design and Implementation of Web Application based on Spring MVC and iBATIS Framework
LIU Gao-Jun;XIA Jing-Long
..............
page:25-30
cheek point xie zhu cio da zhan jiang shi wang luo
..............
page:86-87
Research on Security Strategy of Network Virtual Server
Li Ping
..............
page:43-46
jian dan san bu zou , bang zhu qi ye ji qi it tuan dui yu fang ddos gong ji
..............
page:88-90
Design and Implementation of an Oracle Disaster Recovery System
LIU Bo;LIU Xiao-jie
..............
page:31-35
hui se zhi ying
..............
page:99
Analysis on Governmental Web Application Security Building
LI Wei
..............
page:47-52
jie pu fu wu qi qun zu fang hu xi tong
huang yong tao
..............
page:91-93
qu shi ke ji xie xin ban deep security mai xiang yun duan , cu xu ni hua he yun jin cheng
..............
page:94-95
wang shen secfox an quan guan li ping tai wei min hang ye wu an quan bao jia hu hang
..............
page:96-98
Security Risk Analysis and Assessment Method of Web
TAN Bin;JIANG Fu-de;LIANG Ye-yu;NING Jian-chuang;QIU Lan
..............
page:53-56
Analysis of Protection for Windows Domain controller
LU Wen-xian
..............
page:57-60
Research of QVOD Monitoring Technology
LIU Xiao-feng
..............
page:61-62,65
Process Analysis of Data Recovery Under FAT32
WEN Ge;ZHU Jia-you
..............
page:63-65