Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2012 Issue 8
geng gao geng kuai geng qiang
..............
page:1
gao ji yin dun ji shu dui dang qian xin xi an quan fang hu ti chu de yan jun tiao zhan
..............
page:2-4
Research and Application of an Extended PDR Security Model
guo jian jun ; zhang jian ; liu chang ming ; luo yun feng
..............
page:5-9
Introduction of The Second Onion Routing Anonymous Communication System - Tor
liu zuo
..............
page:10-18
A New Intellectualized Intrusion Detection System
liu xing
..............
page:19-23
A discovery service of EPC network based on the hybrid P2P structure
ma yan hui ; zhang cheng lin ; gu xin
..............
page:24-29
Universal Digital Image Encryption Algorithm Base on Chaotic Sequence
lu shou dong
..............
page:30-34
An Identity-based Threshold Signcryption Scheme in the Cloud Storage
zhou jun ping ; sun zuo hong ; hao hui juan ; liu yong
..............
page:35-39
The Description and Validation of ARQ Protocol Based on TLA
wu yong ; li xiang
..............
page:40-43
Design and implementation of Hard Disk Encryption Based on AES Algorithm
wang bin ; li he
..............
page:44-48
Model of Campus Network Security Incident Response Linkage System
zhang xin gang ; tian yan ; wang bao ping ; cheng xin dang
..............
page:49-51
The Overall Construction of the Campus Network Safety System and Realization Method
cheng long quan
..............
page:52-56
Chances and Challenges for Internet of Things
liu zuo ; liu fu qiang ; ma lin
..............
page:57-60
The Analysis and Research of Security Issues on Internet of Things
han hai xiao
..............
page:61-64
Application of XML Digital Signature to Electronic Order System
liu jun ; wang zhen zuo
..............
page:65-67
The Analysis of MAC Layer Access Technology in 802.11 Standards
lu wei
..............
page:68-71
Research of Information Security Guarantee System Construction
zhang jin hui ; wang wei ; hou lei
..............
page:72-75
P2P Network Security and Prevention
cai zhen
..............
page:76-78
Study on Technology of Network Isolation
he xu tian
..............
page:79-81
E-government Data Center Security Analysis
yang can
..............
page:82-85
Analysis for Difference between Mandatory Access Control and Discretionary Access Control
li guang
..............
page:86-88
xia yi dai an quan jia gou wu zhou nian cheng guo xun li kai qi wang yu xing yun xin zheng cheng
..............
page:89-90
hui pu an quan bao gao : jing ti yi you lou dong gong ji bian yi , ding zhi ying yong lou dong jia ju
..............
page:91
qu shi ke ji cio feng hui : ba mai yun ji suan , zu ji yun wei xie
..............
page:92-93
catechnologies xie shou ben di it fu wu ti gong shang , kuo zhan zhong guo da lu he tai wan di qu ye wu
..............
page:94
qu shi ke ji fa bu yi dong zhong duan an quan zhan lue
..............
page:95
wang luo yun ying jian kong li qi -soc xi tong zong shu
liu ya xuan
..............
page:96-97
xu ni zhong duan guan li xi tong zhu li an quan yun wei
wang wei
..............
page:98
di er ge utm
..............
page:99
yan lun
..............
page:100