Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2014 Issue 2
xp tui yi zhi you
ben kan bian ji bu ;
..............page:1
Private-preserving Computational Protocol of Basic Operation Between Sets
WANG Ting;LUO Wen-jun;Department of Computer Engineering;Shanxi Vocational Poly-tech College;College of Computer Science and Technology;Chongqing University of Posts and Telecommunications;
..............page:2-6
The VPN Key Management Model based on Quanturn Key Research
ZHAO Jing;Beijing institute of information technology computer engineering;
..............page:7-10
Design and Realization Analysis based on RTP Protocol Streaming Media Recognition Algorithm
JI Ling;LI Yi-qian;CLP Group 28 research institute;
..............page:11-13
The Analysis and Design of the User Powers Management based on Interceptor
YANG Guang-bao;Qingtian Branch School Of Zhejiang Radio & Television University;
..............page:14-20
The Discussion under the 4G Era of China Unicom VAC System Security Reinforcement Scheme
ZHANG Peng;SONG Jian-yong;China unicom Inner Mongolia branch;
..............page:21-25
Security Manage System of Android Application based on Web
YI Ming;YE Jia;SHI Yu;ZTE corporation;
..............page:26-28
Design of Security Defense System based on Double Honeypot
WANG Cai-mei;Hefei University Key Laboratory of Network and Intelligent Information Processing Hefei;
..............page:29-33
The study on the Validity and Reliability of Digital Audio Watermarking
Li Shan-shan;Liu Ting-ting;Bao kun;Qiao Rui-juan;School of Information Science & Engineering;Hebei University of Science Technology;
..............page:34-36
Evolution Mechanism and Guidance and Control Strategies of Public Opinion in Emergency
ZHANG Xin-gang;WANG Yan;College of Computer&Information Technology;Nanyang Normal University;College of Journalism and Communication;Nanyang Normal University;
..............page:37-40
Solution to Curb Internet Worm Propagation
ZHU Li-zhi;Information Center;Nanjing University of Aeronautics And Astronautics;Beijing University of Aeronautics and Astronautics State Key Laboratory of Software Development Environment;
..............page:41-43
ipsec vpn she ji
vijay bollapragada mohamed;khalid scott wainner;
..............page:43
Research on the Network and Application Security of Industrial Control Production System
SANG Sheng-jie;Daqing Oilfield information technology co.;LTD;
..............page:44-47
Research and Application of Data Mining in the Prevention of Financial Risks
LI Hao-guang;Guangdong Polytechnic College;
..............page:48-51
On the Leakage Hidden of the Secret Information in the Security Management of Using the Computer and its Measures
HUANG Gui-ning;Library;Guangxi University of Finance and Economics;
..............page:52-56
Application Research of Data Preparation in Implementation of ERP
ZHANG Jun;No.38 Research Institute;China Electronics Technology Group Corporation;
..............page:57-60+64
Security Management Analysis and Countermeasures of College Computer Room
WANG Shou-hong;Computer Science and Engineering College;Anhui university of science and technology;
..............page:61-64
2014 nian ji shu qu shi yu ce
yu zhi wei ;
..............page:71-72+74
xie zai 3q da zhan zhi hou
qu ding ;
..............page:81
yan lun
..............page:82