Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2014 Issue 6
shi jie bei an quan da sai
ji suan ji an quan bian ji bu ;
..............page:1
Authentication Method for Real-time Data Stream based on Digital Signature
WANG Fang-nian;,YANG Xiao-ming;
..............page:2-5
Design of Security Service Architecture in Cloud Computing Environment
HUANG Ning;,WU Yong-jiao;
..............page:6-10
The Research of Application Layer DDoS Attack Detection based the Model of Human Access
CONG Li-gang;,DI Xiao-qiang;,GUO Li-jv;,LI Ping;
..............page:11-14
Research of Protocol Analysis and Information Monitoring Technology for MSN
BAI Gui-gui;,LEI Yong;,LIU Liang;,YANG Rui;
..............page:15-18
Analysis of WEB Scans Network Data Features
LI Hao-song;,WANG Wei;,ZHANG Jian-ye;
..............page:19-23
Embedded Software Testing Engineering Practice
CHEN Ming-zhu;,ZHOU Wei;
..............page:24-27
Research on Software Security Testing
CHEN Yu-tao;,LI Lin-lin;,LIU Ren-qian;,ZHANG Yu-zhong;
..............page:28-32
Implementation of a LAN Web Service Information Security Model
HE Hao;,LI Wei;,YANG Dao-chi;
..............page:41-44
Thinking of Establishing LAN Security
Cui Hai-yan;,Zhao Xin-min;
..............page:45-47
Analysis of Security and Defense of Campus Network Access Authentication based on 802.1x
MENG Gang;,WANG Zhi-gang;,XIANG Fei;
..............page:51-53
Auto Manufacturing IT Information Security Practices
CHEN Zhi-qiang;,WU Ji-jun;,YANG Shao-guo;
..............page:54-56
gou jian jian gu de ying yong fu wu qi an quan fang huo xian
xi an jiao da jie pu wang luo ke ji you xian gong si ;
..............page:62-65
xin xi dong tai
..............page:68