Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Applications and Software
1000-386X
2002 Issue 11
IMPLEMENTING THE SOCKET LAYER ENCRYPTION/DECRYPTION IN LINUX
wang yan mei ; tong li ; gan jia zhou ; gu xun zuo
..............
page:62-封三
REALIZATION OF DATA ENCRYPTION SCHEME BASED ON TRIPLE DES AND ECC
fu de sheng ; sun wen jing
..............
page:59-61
ABOUT THE SECURITY OF SSL IN ELECTRONIC COMMERCE OVER THE INTERNET
ling jie ; he dong feng
..............
page:56-58
NETWORK SECURITY TECHNIQUES
zhu min
..............
page:53-55
STUDIES ON INFORMATION HIDING ALGORITHMS BASED ON COLOR STILL IMAGE
wei wei min
..............
page:50-52
AN ANALYSIS OF RADIUS SECURITY
zhou wei dong ; zuo chu ping ; sun shuo
..............
page:47-49
A STUDY ON THE SECURITY PROPERTIES OF IPv6 AND ITS APPLICATION
gao fa gui ; guo xue li ; wang lu qun
..............
page:44-46
TRUSTED COMPUTER NETWORK SYSTEM'S STANDARD AND IMPLEMENTATION
ou yang yi ; zhou li feng ; zhang shao lian ; huang zuo
..............
page:40-43,58
DESIGN AND IMPLEMENTATION OF SEGMENTATION FIREWALL BASED ON USB INTERFACE APPLIED TO THE INDUSTRIAL CONTROL ENVIRONMENT
yang run hua ; yang han xiang ; luo you ping
..............
page:38-39,52
A STUDY OF JAVA2 SECURITY MECHANISM
rao feng ; mao di lin ; dai chun yang
..............
page:35-37
A STUDY OF INTRUSION DETECTION SYSTEM AND AN IMPLEMENTATION OF NIDS BASED ON LINUX
shao peng ; zhang wen jie ; cao xiu
..............
page:32-34
AN SECURITY ANALYSIS OF ROBUST SECURITY NETWORK BASED IEEE802.11
wang kang gui ; jing jin hua ; zhang gen du
..............
page:29-31
A SIMULTANEOUS TYPE OF DIGITAL SIGNATURE SCHEME WITH BLIND AND MULTI- SIGNATURE FUNCTIONALITY BASED ON Schnorr SCHEME
huang shao yin ; liu yan ; gao chuan shan
..............
page:27-28,封三
AN APPROACH TO NETWORK BASED SECURITY AUDITING SYSTEM
wang wei zuo ; li cheng ; li jia bin
..............
page:24-26,61
DESIGN AND IMPLEMENTATION OF A WIRELESS SECURITY GATEWAY
mao di lin ; yang zuo ; zhang zuo
..............
page:22-23,49
A STUDY OF SECURITY MECHANISMS FOR WEB APPLICATIONS BASED ON . NET FRAMEWORK
he jin ling
..............
page:19-21
A TREATISE ON THE TREND OF INTERNET FIREWALL DEVELOPMENT
li hai quan ; li gang
..............
page:15-18,55
IMPLEMENTATION OF A PC ENCRYPTION CARD BASED ON DSP
shen tao ; ma hong guang ; xue wen tong
..............
page:12-14
DESIGNING THE SECURITY POLICY IN OPERATING SYSTEMS
cai yi ; shen chang xiang
..............
page:8-11
A NEW FRAMEWORK OF APPLICATION LAYER SECURITY
zheng zhi rong ; shen chang xiang
..............
page:6-7,55
A METHOD IN IMPLEMENTING THE DISTRIBUTION OF MULTICAST KEY
xie yu qiang ; wang yu qin ; luo lei fei
..............
page:3-5
ON THE NETWORK SECURITY MANAGEMENT SYSTEM
gao chuan shan
..............
page:1-2,5