Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2013 Issue 2
wang an xiao yan
..............
page:1
Research of SSL VPN Secure Access to Campus Network based on the IVE
luo hui qiong ; nie rui hua ; lin huai gong
..............
page:41-46
Research on Solutions to Security Problem of DHCPApplication on Campus Network
liu xiao hua
..............
page:47-50
Design and Implementation of a Public Opinion Monitoring System of Campus Network
cai hong min ; chen zuo
..............
page:51-54
The Design and Realization of Digital Campus Unified Identity Service based on Single Sign-On Technology
gao zhuo ; yang ; huang wan ping
..............
page:55-58
The Analysis and Detection of Computer Graphics Electromagnetic Information Leakage
zhao zhi qiang ; liu tai kang ; jiang yun
..............
page:20-22
The Application Research of IPv6 in the Next Generation Internet
sun yu
..............
page:59-62
Implement and Apply of network sniffers based on raw socket
lu en ming ; gao jian hua
..............
page:23-26
Web front-end Security Protection Discussion
wang guang
..............
page:63-65
The Application of Management Operation and Maintenance Software Used in Large Hospital
yao li ; feng juan ; jiang kun
..............
page:66-69
Research on Intrusion Detection System Based on PCA
zhang xu
..............
page:27-30
Networking Scheme of Insurance Services for Insurance Company Branch Based on 3G
cao jia jian
..............
page:70-72
idc:2013 nian zhong guo it an quan shi chang 10 da yu ce
..............
page:73
Security Mechanism of Real-time Operating System for IMA
du xu yang
..............
page:31-34
A Research of the Essence of SQLIA Vulnerability and the Drawbacks Analysis of Exiting Input Filtering and Static and Runtime Checking Techniques
zou ben na
..............
page:35-37
rsa hu yu : ying jie xin xi an quan zhong de da shu ju ge ming
..............
page:74
Application of Network security Environment of WSS Technology in Web Site Development
dai zan ding ; hu yan ; fu bin ; hu li jun
..............
page:38-40
xin xi an quan tai shi fen xi
..............
page:79-80
qu shi ke ji fa bu 2013 xin xi an quan guan jian shi da yu ce bao gao
..............
page:75-76
2013 nian qian zhan : que bao ye wu an quan cheng wei qi ye shou yao ren wu
..............
page:81
sai men tie ke fa bu 2013 nian yun duan xian zhuang diao cha : gui bi yin xing yun cheng ben
..............
page:77-78
fu wu bao zhang bian ge it yun ying de wu da bu zhou
..............
page:82
xia yi zhan
..............
page:83
yan lun
..............
page:84
Research and Analysis of Event Correlation Model in the Interaction System
lu xu ; luo jin yu ; yuan ye ; ren chun lei
..............
page:16-19
Analysis of Network Security System Evaluation based on the Fuzzy Weighted Logic Reasoning
he zuo
..............
page:11-15
Research of RFID Cryptographic Protocol based on the Hash
lu huan huan ; li fei
..............
page:6-10
Design and Implementation of a Network Accelerate Engine Model
fang lang ; zhao kui ; liang gang ; wang zuo fan
..............
page:2-5
rsa hu yu : ying jie xin xi an quan zhong de da shu ju ge ming
..............
page:74
wang an xiao yan
ben kan bian ji bu ;
..............
page:1
xia yi zhan
qu ding ;
..............
page:83
fu wu bao zhang bian ge it yun ying de wu da bu zhou
..............
page:82
yan lun
..............
page:84
idc:2013 nian zhong guo it an quan shi chang 10 da yu ce
..............
page:73
qu shi ke ji fa bu 2013 xin xi an quan guan jian shi da yu ce bao gao
..............
page:75-76