Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2012 Issue 7
ying zai chuang xin
..............page:1
cpk si yue wang shang fen fa xie yi
..............page:2-3
xin xi dong tai
..............page:3,30,35,46,60,98,100
Design and Implementation of a Remote File Backup System on Android Phone
MA Lian-zhi;YANG Pin;WANG Zhe
..............page:4-7
Hardware Implementation Analysis and Design of AES Algorithm
GUO Jian-jun;LIU Chang-ming;SHI Ying;LU Xia;ZHANG Jian
..............page:8-12
An Improvement Method to Implement the DES(Data Encryption Standard) Encryption Algorithm
ZHOU Wen-ting;MA Feng-wei;KONG Qing
..............page:13-16
Encode and Decode of Turbo code Base on Syndromes
ZHANG Ning;GUO Da-bo;LIU Gang;ZHANG Yan-huang
..............page:17-20
Local Area Network Centralized Management of Safety Protection System Research
ZHOU Hong-ying;NIE Yuan-ming;WANG Xiao-yang
..............page:72-75
Design and Application for WLAN
SUN You-ming
..............page:76-78
Security Analysis and Defend Strategy for Enterprise Network
LIU Ya-li;DENG Gao-feng
..............page:83-85
Design and Implementation of an Oracle Disaster Recovery System
LIU Bo;LIU Xiao-jie
..............page:31-35
hui se zhi ying
..............page:99
jie pu fu wu qi qun zu fang hu xi tong
huang yong tao
..............page:91-93
Security Risk Analysis and Assessment Method of Web
TAN Bin;JIANG Fu-de;LIANG Ye-yu;NING Jian-chuang;QIU Lan
..............page:53-56
Analysis of Protection for Windows Domain controller
LU Wen-xian
..............page:57-60
Research of QVOD Monitoring Technology
LIU Xiao-feng
..............page:61-62,65
Process Analysis of Data Recovery Under FAT32
WEN Ge;ZHU Jia-you
..............page:63-65