Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2007 Issue 3
The Realization of Monitoring System of Network on Linux
Li Ruiwei;Ye Lichun
..............page:11-13
News
..............page:96
Analysis on Throughput of Data Transmission in Bluetooth Scatternet
Guo Feng;Geng Anan;Zhuang Yiqi
..............page:93-95
The Classification of Assets of Telecommunications Data Network
Guo Shuguang;Zhang Ruili
..............page:91-92
The Use of Symmetric Cipher in Identification
Hu Xiangyi;Li Yan
..............page:86-87,90
Analyzing the Effectiveness of Battlefield Network Attacking
Li Dong;Song Lihong;Wang Lu;Lei Zhidong
..............page:78-79,92
The Analysis of Security Leaks in .NET Programming
Huang Yanbo;Zhong Fenghua
..............page:76-77,51
Improving Grid Computing Security with TPM
Liu Ping;Chi Yaping;Fang Yong
..............page:74-75,67
Research on Security Model Based on Trust in Pervasive Computing Envirenment
Wang Li;Duan Huichuan;Si Qingyan
..............page:62-64,38
Review and Research on Grid Authorization Techniques
Zhang Chenjing;Han Chunjing;Liao Zhensong
..............page:39-41
Data Capture in the Intrusion Honeypot System
Yu Wei;Hu Bei;Chen Changfang
..............page:36-38
Research of Network Security Technology for IDC
Wang Ting;Huang Wenpei
..............page:28-30
The Key Technologies of Intrusion Detection System Based on Mobile Agent
Chen Yunfang;Wang Ruchuan
..............page:25-27
Networks Topology Finding Based on SNMP and Depicting Topology Spanning Tree
Qu Zhaoyang;Hu Xuchao
..............page:23-24,27
Service Development Mode Based On Parlay Web Service Technology
Shen Yulong;Pei Qingqi;Ma Jianfeng
..............page:20-22
Design and Analysis of Enhanced PKI Application Model in IPSec-VPN
Fan Bingbing;Long Can
..............page:17-19
Implementation and Evolution of SNMP's Security Mechanism
Chang Wenna;Guo Yuchun
..............page:14-16
The Analysis of safe Certificate in E-Commerce
Shuai Qinghong
..............page:57-59
The Aggressive Network Defense and It's Application Research
Huang Jialin;Zhang Zhengfan
..............page:48-51
Rearch on DoS Attack to DHT of P2P
Zhu Yunpeng;Lu Yuliang
..............page:45-47