Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2014 Issue 6
shi jie bei an quan da sai
ji suan ji an quan bian ji bu ;
..............
page:1
Authentication Method for Real-time Data Stream based on Digital Signature
WANG Fang-nian;,YANG Xiao-ming;
..............
page:2-5
Design of Security Service Architecture in Cloud Computing Environment
HUANG Ning;,WU Yong-jiao;
..............
page:6-10
The Research of Application Layer DDoS Attack Detection based the Model of Human Access
CONG Li-gang;,DI Xiao-qiang;,GUO Li-jv;,LI Ping;
..............
page:11-14
Research of Protocol Analysis and Information Monitoring Technology for MSN
BAI Gui-gui;,LEI Yong;,LIU Liang;,YANG Rui;
..............
page:15-18
Analysis of WEB Scans Network Data Features
LI Hao-song;,WANG Wei;,ZHANG Jian-ye;
..............
page:19-23
Embedded Software Testing Engineering Practice
CHEN Ming-zhu;,ZHOU Wei;
..............
page:24-27
Research on Software Security Testing
CHEN Yu-tao;,LI Lin-lin;,LIU Ren-qian;,ZHANG Yu-zhong;
..............
page:28-32
Comparative Analysis and Application of Authentication Identity Technology PKI and IBC in Hybrid Cloud Service
TIAN Jing;
..............
page:33-35
Research on Intrusion Detection in E-Commerce Security Construction
GAN Yu;
..............
page:36-40
Implementation of a LAN Web Service Information Security Model
HE Hao;,LI Wei;,YANG Dao-chi;
..............
page:41-44
Thinking of Establishing LAN Security
Cui Hai-yan;,Zhao Xin-min;
..............
page:45-47
Safety Management Scheme for Mobile Intelligent Terminal in Enterprise Application Scene
DU Hai-feng;
..............
page:48-50,61
Analysis of Security and Defense of Campus Network Access Authentication based on 802.1x
MENG Gang;,WANG Zhi-gang;,XIANG Fei;
..............
page:51-53
Auto Manufacturing IT Information Security Practices
CHEN Zhi-qiang;,WU Ji-jun;,YANG Shao-guo;
..............
page:54-56
Discussion of Security Policy of the Broadcasting and Television Station's Intranet
Shi Guo-bao;
..............
page:57-61
gou jian jian gu de ying yong fu wu qi an quan fang huo xian
xi an jiao da jie pu wang luo ke ji you xian gong si ;
..............
page:62-65
qu shi ke ji deep security hu hang guang dong zhong yan ji tuan yun ji suan ping tai
..............
page:66
jia ge ying de yong hu , an quan ying de guan jun
qu ding ;
..............
page:67
xin xi dong tai
..............
page:68