Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Wuhan University(Natural Science Edition)
1671-8836
2006 Issue 5
Trinomial Property of p-Ary Sequences
HUANG Zeming;LI Chao
..............page:655-658
Automatic Programming Methodology for Program Reuse
KANG Zhuo;LI Yan;HUANG Jingwei;KANG Lishan
..............page:649-654
Access Control Policies for Web Based Library Management System
Mohamed M.Jalloh;REN Shengbing
..............page:644-648
Development of Trusted Computing Research
ZHANG Huanguo;LUO Jie;JIN Gang;ZHU Zhiqiang;YU Fajiang;YAN Fei
..............page:513-518
Computer Forensics Research and Implementation Based on NTFS File System
WANG Lina;YANG Mo;WANG Hui;GUO Panfeng
..............page:519-522
Digital Forensics of Trusted Computing Environment
LI Binglong;WANG Qingxian;LUO Junyong;LIU Bin
..............page:523-526
Topology Auto-Generation on Large-Scale Heterogeneous Intra-AS Network
HU Huaping;L(U) Zengwang;LIU Bo;WANG Gu
..............page:550-554
Space Model of Information Hiding
PENG Deyun;WANG Jiazhen;YANG Sumin;XU Bo
..............page:560-564
A Secure Communication Model on Solving Anycast Scalability in IPv6
WANG Xiaonan;QIAN Huanyan
..............page:565-569
A Colligation Security Model of Web Services Based on SOAP Message
LIU Zhenpeng;ZHOU Dongdong;XUE Linyan;CHANG Xiaomeng;SONG Xiaojing
..............page:570-573
A Data Protection Model Based on User's Intention
CAO Sihua;HE Hongjun;LUO Li;FENG Tao
..............page:574-577
A Temporal Role-Based Administration of Authorization Model
ZHANG Shaomin;WANG Baoyi;ZHOU Lihua
..............page:578-581
An Improved Algorithm for Network Survivability Based on Autonomous Configuration
ZHAO Guosheng;WANG Huiqiang;WANG Jian
..............page:582-586
A Fingerprint Verification Algorithm Based on Fingerprint Classification
CHEN Chunxia;YIN Xinchun;WANG Qiuping
..............page:587-591
A New Threshold Proxy Signature Scheme with Known Signers
WANG Tianyin;CAI Xiaoqiu;ZHANG Jianzhong
..............page:592-595
A Self-Renewable Hash Chain Scheme
ZHANG Haojun;ZHU Yuefei
..............page:596-599
Distributed Stateful Inspection Technology on Hash
GUO Fangfang;YANG Yongtian
..............page:604-607
The Method of Information Security Risk Assessment Using Bayesian Networks
FU Yu;WU Xiaoping;YAN Chenghua
..............page:631-634
A Novel Method of Alarm Clustering Based Distributed Intrusion Detection
FENG Guangsheng;WANG Huiqiang;WU Junpeng;ZHAO Qian
..............page:635-638
Application of Network Cybernetics in Network Attack and Defense
HE Ning;LU Yu;WANG Lei
..............page:639-643
Dynamic Network Forensics Based on Immune Agent System
WANG Diangang;LI Tao;LIU Sunjun;WANG Tiefang
..............page:527-531
A New Method of Trusted Protection for Process
REN Jiangchun;WANG Zhiying;DAI Kui
..............page:532-536
Automated Trust Establishment in Open Systems
GUO Yajun;XU Fen;HONG Fan;CHEN Li;LI Rong
..............page:541-544
Provably Secure Internet Key Exchange Protocol
CAO Chunjie;ZHANG Fan;MA Jianfeng
..............page:545-549
Adaptive Detection of SYN Flooding Attacks at Source-End Networks
YU Ming;CHEN Weidong;ZHOU Xiyuan
..............page:608-612
An Automatic Testing Method of Invalid Arithmetic Operations
CAO Wenjing;XU Shenghong;GONG Yunzhan
..............page:613-617
Usage Oriented Critical Testing Paths Selecting Strategy for GUI Software
YE Mao;FENG Boqin;ZHU Li
..............page:618-621
The Model of Network Security Risk Assess Based on Fuzzy Algorithm and Hierarchy
WANG Chujiao;LIN Guoyuan
..............page:622-626
Trust Evaluation Model Based on Dempster-Shafer Evidence Theory
YUAN Lulai;ZENG Guosun;WANG Wei
..............page:627-630