Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2012 Issue 8
geng gao geng kuai geng qiang
..............page:1
Research and Application of an Extended PDR Security Model
guo jian jun ; zhang jian ; liu chang ming ; luo yun feng
..............page:5-9
A New Intellectualized Intrusion Detection System
liu xing
..............page:19-23
A discovery service of EPC network based on the hybrid P2P structure
ma yan hui ; zhang cheng lin ; gu xin
..............page:24-29
An Identity-based Threshold Signcryption Scheme in the Cloud Storage
zhou jun ping ; sun zuo hong ; hao hui juan ; liu yong
..............page:35-39
The Description and Validation of ARQ Protocol Based on TLA
wu yong ; li xiang
..............page:40-43
Model of Campus Network Security Incident Response Linkage System
zhang xin gang ; tian yan ; wang bao ping ; cheng xin dang
..............page:49-51
Chances and Challenges for Internet of Things
liu zuo ; liu fu qiang ; ma lin
..............page:57-60
Application of XML Digital Signature to Electronic Order System
liu jun ; wang zhen zuo
..............page:65-67
Research of Information Security Guarantee System Construction
zhang jin hui ; wang wei ; hou lei
..............page:72-75
P2P Network Security and Prevention
cai zhen
..............page:76-78
Study on Technology of Network Isolation
he xu tian
..............page:79-81
E-government Data Center Security Analysis
yang can
..............page:82-85
wang luo yun ying jian kong li qi -soc xi tong zong shu
liu ya xuan
..............page:96-97
di er ge utm
..............page:99
yan lun
..............page:100