Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2007 Issue 1
Safe technique in future network development trend
Li Jun
..............page:10-11
Research of Cross Certification and Trust Model in PKI
Liu Zhuochen;Li Lingying
..............page:29-31
The Research on Detecting NUSHU Convert Channel
Jiang Zhongguo
..............page:32-34
An Overview on the Intrusion Detection System
Xia Dandan;Li Gang;Cheng Mengmeng;Yu Liang
..............page:35-36,26
The Design and Implement of Client Management Through IP-VPN Gateway
Yang Xuejun;Li Jianliang
..............page:37-39
EPON Network Management System Based on SNMP and JAVA
Liu Wei;Shi Jian;Yang Tao
..............page:44-46
The Spyware and the Tactics How to Prevent it
Zhao Youcai;Liu kesheng;Yang Zhidan
..............page:47-48,60
WEB Level Application Frame Design and Realization
Li Dong
..............page:49-51
Realizing Secure Data Exchange Service Based on XML
Ouyang Jin
..............page:55-57,46
The Current Research Topics and Prospects of Trusted Computing
Zhang Xingang;Liang Huijun
..............page:58-60
Analysis and Implement of Grid's Security
Niu Xiaobing;Li Daxing
..............page:61-63
The Realization of Intelligent Adapter Based on PCI Express
Dai Chen;Fu Huaming
..............page:64-65,68
Modern Electronic Commerce Safety Work Research
Yang jin
..............page:66-68
Campus Network Security Management Research
Du Pengfei
..............page:69-70
Research of Deploying Automatic Updates in Campus Network
Chen Jun;Duan Huiliang
..............page:71-74
The Technology Model Analysis of Web Data Mining and the Arithmetic of Mining
zeng li jun ; gui wei hua
..............page:75-76,43
The Wave Flower Sieves the Hero
..............page:14
Network Defense in Depth and Intrusion Prevention System
Yu Ming;Chen Weidong;Zhou Xiyuan
..............page:15-17
Research of Intrusion Detection System Based on ASP
Ji Longtao;Li Yaru
..............page:18-20,17
A Research of Computer Security Base On Artificial Immune System
Zhang Dengke;Ge Hong
..............page:21-23
Prevents and Eliminates Macrovirus the Method
Gao Yongren
..............page:27-28,23
The Research of PE Software Watermarking Against Similarity Attack
Wang Xiaojun;Wang Yanbo;Zhang Xiaoyong;Wang Ning;Liu Hongwei
..............page:82-84,74
Designation & Implementation of an Encryption Scheme
Liu Peihe;Du Peng;He Wencai;Niu Xiaolei;Zhang Yuanyuan
..............page:87-89
An Iris Recognition Algorithm Based on SOM Neural Network
Fan Kefeng;Pei Qingqi;Wang Zhanwu
..............page:90-91,79
An Encrypted Computer Communication System Based On Secure FTP
He Wencai;Zhuang Yuanyuan;Liu Peihe;Niu Xiaolei;Du Peng
..............page:92-94