Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2001 Issue 5
Visiting Control Principle and its Realization
Qin Chao;Duan Yunsuo;Chen Zhong
..............page:54-58
Determination of Nature of Personal Defamation in Internet
Zhu Tiejun;Xia Jun;Li Changkun
..............page:52-53
On Investigative Ways in Cyber Crimes
Hu Zhenliao;Sun Xiaodong;Gao Yuan
..............page:44-46
Cyber Crimes in Finance and its Prevention
Liu Jian
..............page:41-43
Security Prevention for Dialing log-on
Dai Yuanyi;Yang Hui
..............page:38-40
Physical Isolation:ASafe Way for Government On-line
Li Wei;Liu Liangchao
..............page:36-37
On Realm Name Protection of China Digital Libraries
Zheng Shurong;Zhao Peiyun
..............page:32-35
Solution of Mobile Identification System in Stock Exchange
Liu Dongcai
..............page:29-31
Application of Service Unit in Internet/Intranet
Jia Chao
..............page:26-28
Design and Realization of Web Armor System
Fan Yuanshu;Lu Langru;Chu Zefu
..............page:22-25
Intrusion Detective System Based on Mobile Agent
Deng Zhao;Wu Hao
..............page:15-19
A Research on the Exactness and Encrypting Strength of RSA Calculation
Liang Zhilong;Zhang Zhihao
..............page:11-14