Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Nanjing University of Posts and Telecommunications(Natural Science)
1673-5439
2009 Issue 3
Research and Implement of Anomaly Policy Detection in NP Firewall
SUN Ze-dong;ZHANG Lu;LUO Jun-zhou
..............
page:43-48
Secure Steganography in JPEG Images Based on PSO and Improved PMI
YU Li-fang;ZHAO Yao;NI Rong-rong
..............
page:49-53
Research on Trustworthy Mobile Agent and Application in the Distributed Network Management
LUO Chen;HE Ming;QIU Hang-ping
..............
page:54-56
Research of Clustering Algorithm in Intrusion Detection of Mobile Ad hoc Networks
LI Fei;WU Meng
..............
page:32-36,42
An Efficient Certificateless Blind Signature Scheme
YANG Xiao-yuan;LIANG Zhong-yin;GUO Yao;CHEN Hai-bin
..............
page:37-42
The Design and Research of Security Remote Protective Relay Setting System
XU Ning;SONG Yu-bo;LIU Jin-guan;YAN Guo-ping
..............
page:57-63
A Method of Edge Filter Demodulation by Using Temperature Compensation for HBF Sagnac LM
HUANG Yong-lin;DAI Sen
..............
page:64-66,72
An Algorithm for Multimedia Transmission in Wired/Wireless Hybrid IP Networks
ZHAO Hai-tao;DONG Yu-ning
..............
page:67-72
A Modified CMA Algorithm of QAM System:MCADAMA
KONG Yuan-yuan;WANG Xin;FENG Guang-zeng
..............
page:73-77
Research of the Grid Security Model for Visit Based on the Trust
WANG Cheng;ZHANG Zu-chang
..............
page:78-82
An Optimal Cross-layer Spectrum Sharing Scheme for Cognitive Radio Based Ad hoc Network
WU Chun-de;PAN Zhi-wen;YOU Xiao-hu
..............
page:83-87
Transport Control Protocol Research over Satellite Network
XIAO Fu;WANG Ru-chuan;YE Xiao-guo;SUN Li-juan
..............
page:88-94
An Anomalies Detection Method Supplied for the IP Address Traceability
WANG Ming-hua;ZHOU Yuan;LI Ai-ping;ZHANG Bing;LUO Na
..............
page:1-6
Multi-attribute Group Decision-making Security Assessment Based on VC-DRSA
ZHAO Liang;XUE Zhi
..............
page:7-13,20
Research and Implementation of Network Attack Flow Redirection Mechanism in the Honeyfarm Environment
LU Teng-fei;CHEN Zhi-jie;ZHUGE Jian-wei;HAN Xin-hui;ZOU Wei
..............
page:14-20
The Research on Remote Control System Based on Agent
ZHANG Bing;FENG Yang;LUO Kai-kai;LUO Sen-lin;WANG Li-ping
..............
page:21-26
An Anti-forensic Scheme Based on Symmetrical Encryption and Steganography
WANG Can;QIN Zhi-guang
..............
page:27-31