Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2004 Issue 11
To Improve Network Security by Multi-platform Co-operation
mi lu shen ; zou peng
..............page:39-39,38
Digital Watermarking Techniques and application
xing xie yong
..............page:40-41,44
Research on Security Mechanism of Multi-Agent Systems
liu sheng gui ; feng gang
..............page:42-44
Research Advance on Digital Watermarking
wang guo you ; yang yong xiang
..............page:45-48
Research on the Management of Confidential files Based on COM Technique
zhang lian kuan ; wei lin na
..............page:49-52
The Implementation and Instance Analysis of Elliptic Curve Cryptography
li jun fang ; cui jian shuang
..............page:56-57,55
News
..............page:78-79
Exhibition
..............page:76-77
Production Show
..............page:74-75
Book Shelves
..............page:72-73
Tientsin Correspondence Information Secrecy Summary
tian jin shi tong xin gong si
..............page:70-71
Put An End To Maleficence Information, Establish Exuberance Network
shen zuo shi di meng xin xi ji shu you xian gong si
..............page:68-69
Locality Information Secrecy Statute Investigation
ma lie fang ; tao zuo
..............page:65-67
The Analysis of Security RequirementsBased on Information Security Theory and Models
zuo jing hua ; ma wei guo ; hu dao yuan
..............page:58-60,52
The Investigation of GAP Technology in Network Security
ma qiang ; li yan jun
..............page:36-38
The Application of Network Surveillance
yu hai tao ; jiang fan
..............page:28-30,27
Now Domestic Computer Network Security Vulnerability Research
li lang ; chen xi hui ; xu qiong fang ; luo wen
..............page:25-27
Offal mail Aboud And Country Interveror General
li xian hua
..............page:20-24
MSN Virus Family Perspective
jiang min xin ke ji ji shu you xian gong si
..............page:19-19
Enhance Training of System Interior Information Secrecy Person with Ability
isec xin xi hua an quan jiao yu ren zheng guan li zhong xin
..............page:15-15,14
Overseas Information Secrecy Training and Authentication Actuality and Development
si yuan xin chuang xin xi an quan zi xun gong si
..............page:12-14
Expert of Information Secrecy Forgather In Changsha
zhan ying
..............page:11-11