Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2004 Issue 11
To Improve Network Security by Multi-platform Co-operation
mi lu shen ; zou peng
..............
page:39-39,38
Digital Watermarking Techniques and application
xing xie yong
..............
page:40-41,44
Research on Security Mechanism of Multi-Agent Systems
liu sheng gui ; feng gang
..............
page:42-44
Research Advance on Digital Watermarking
wang guo you ; yang yong xiang
..............
page:45-48
Research on the Management of Confidential files Based on COM Technique
zhang lian kuan ; wei lin na
..............
page:49-52
The Application of Cryptographic Techniques in Secure Transmission of Streaming Media
chen dao min ; zhou jin quan
..............
page:53-55
The Implementation and Instance Analysis of Elliptic Curve Cryptography
li jun fang ; cui jian shuang
..............
page:56-57,55
News
..............
page:78-79
Exhibition
..............
page:76-77
Production Show
..............
page:74-75
Book Shelves
..............
page:72-73
Tientsin Correspondence Information Secrecy Summary
tian jin shi tong xin gong si
..............
page:70-71
Put An End To Maleficence Information, Establish Exuberance Network
shen zuo shi di meng xin xi ji shu you xian gong si
..............
page:68-69
Locality Information Secrecy Statute Investigation
ma lie fang ; tao zuo
..............
page:65-67
Network Secrecy Protect Numen-Fangzheng Fireproofing Wall Appliance Case In Corporation
..............
page:64-64
Lenovo Fireproofing Wall Production Appliance Case
..............
page:63-63
An Application of Attribute Synthetic Evaluation System in Information System Classified Security Protection
zhou shao hua ; huang hong ; zhou an min
..............
page:61-62,63
The Analysis of Security RequirementsBased on Information Security Theory and Models
zuo jing hua ; ma wei guo ; hu dao yuan
..............
page:58-60,52
The Investigation of GAP Technology in Network Security
ma qiang ; li yan jun
..............
page:36-38
Discussion About How to Construct the Information Security Framework in Enterprises
chen shu
..............
page:33-35
Application of lotus in office automation information system design
zhou wei bin
..............
page:31-32
The Application of Network Surveillance
yu hai tao ; jiang fan
..............
page:28-30,27
Now Domestic Computer Network Security Vulnerability Research
li lang ; chen xi hui ; xu qiong fang ; luo wen
..............
page:25-27
Offal mail Aboud And Country Interveror General
li xian hua
..............
page:20-24
MSN Virus Family Perspective
jiang min xin ke ji ji shu you xian gong si
..............
page:19-19
World Computer Convention Information Secrecy Moot IFIP/SEC2004 Notes
qing si han
..............
page:16-18
Enhance Training of System Interior Information Secrecy Person with Ability
isec xin xi hua an quan jiao yu ren zheng guan li zhong xin
..............
page:15-15,14
Overseas Information Secrecy Training and Authentication Actuality and Development
si yuan xin chuang xin xi an quan zi xun gong si
..............
page:12-14
Expert of Information Secrecy Forgather In Changsha
zhan ying
..............
page:11-11
Information Security Risk Evaluation and Information Security Safeguard System Construction Proseminar Convene
zhan ying
..............
page:10-10