Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Applications and Software
1000-386X
2002 Issue 11
IMPLEMENTING THE SOCKET LAYER ENCRYPTION/DECRYPTION IN LINUX
wang yan mei ; tong li ; gan jia zhou ; gu xun zuo
..............page:62-封三
REALIZATION OF DATA ENCRYPTION SCHEME BASED ON TRIPLE DES AND ECC
fu de sheng ; sun wen jing
..............page:59-61
ABOUT THE SECURITY OF SSL IN ELECTRONIC COMMERCE OVER THE INTERNET
ling jie ; he dong feng
..............page:56-58
NETWORK SECURITY TECHNIQUES
zhu min
..............page:53-55
AN ANALYSIS OF RADIUS SECURITY
zhou wei dong ; zuo chu ping ; sun shuo
..............page:47-49
A STUDY ON THE SECURITY PROPERTIES OF IPv6 AND ITS APPLICATION
gao fa gui ; guo xue li ; wang lu qun
..............page:44-46
TRUSTED COMPUTER NETWORK SYSTEM'S STANDARD AND IMPLEMENTATION
ou yang yi ; zhou li feng ; zhang shao lian ; huang zuo
..............page:40-43,58
A STUDY OF JAVA2 SECURITY MECHANISM
rao feng ; mao di lin ; dai chun yang
..............page:35-37
A STUDY OF INTRUSION DETECTION SYSTEM AND AN IMPLEMENTATION OF NIDS BASED ON LINUX
shao peng ; zhang wen jie ; cao xiu
..............page:32-34
AN SECURITY ANALYSIS OF ROBUST SECURITY NETWORK BASED IEEE802.11
wang kang gui ; jing jin hua ; zhang gen du
..............page:29-31
AN APPROACH TO NETWORK BASED SECURITY AUDITING SYSTEM
wang wei zuo ; li cheng ; li jia bin
..............page:24-26,61
DESIGN AND IMPLEMENTATION OF A WIRELESS SECURITY GATEWAY
mao di lin ; yang zuo ; zhang zuo
..............page:22-23,49
A TREATISE ON THE TREND OF INTERNET FIREWALL DEVELOPMENT
li hai quan ; li gang
..............page:15-18,55
IMPLEMENTATION OF A PC ENCRYPTION CARD BASED ON DSP
shen tao ; ma hong guang ; xue wen tong
..............page:12-14
DESIGNING THE SECURITY POLICY IN OPERATING SYSTEMS
cai yi ; shen chang xiang
..............page:8-11
A NEW FRAMEWORK OF APPLICATION LAYER SECURITY
zheng zhi rong ; shen chang xiang
..............page:6-7,55
A METHOD IN IMPLEMENTING THE DISTRIBUTION OF MULTICAST KEY
xie yu qiang ; wang yu qin ; luo lei fei
..............page:3-5
ON THE NETWORK SECURITY MANAGEMENT SYSTEM
gao chuan shan
..............page:1-2,5