Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2010 Issue 3
Theoretical Research of Evaluation System of china\'s Colleges Website
xing wen chao
..............
page:69-71
An algorithm of dual watermarking signal preprocessing based on Arnold scrambling and Hadamard transformation
luo jin ; hu gui ming ; ji hong jie
..............
page:75-77
Research of an Authentication Protocol Without Trusted Third Party
wang jie ; si zhi gang
..............
page:28-30
Analysis and Comparison on the Detection of the Attacks of DDoS
xiao yan
..............
page:37-40
Architecture Design of Digital Certification System Bases on SysML
li yuan ; ma zi tang
..............
page:17-19
Compact Model Analysis of Social Network
li ze jun ; zeng li jun
..............
page:57-60
A Self-adaptive Multi-party Non-repudiation Protocol
li lei ; wang yu min
..............
page:78-80
Research of multi-mission and high-concurrency data processing platform technique
zhang tao ; li jian ; kang yong jia
..............
page:61-62,68
A New ID-based Group Key Management Scheme for Ad hoc
wang meng ; xu ping ge ; gu wei na
..............
page:31-33
The safety of social insurance network protection
tang xiang lin
..............
page:34-36
Security Analyses and Improvement of WTLS in WAP
yue zuo ; zhu li qiang ; luo yu
..............
page:14-16
H.264 Video Compression Technologies and Applications
wang zhong zhen
..............
page:45-47
Secure access to land and natural resources business network studies
chen miao
..............
page:66-68
Security Analysis of Teaching Local Area Networks
zhang yong
..............
page:52-53
Research and design of a security model based on IDS and Firewall
yu zhi gao ; zhou guo xiang
..............
page:22-24
The analysis of several solutions for the problem of IP QoS
du zuo
..............
page:41-44
Research and Progress of Quantum Cryptography
gan bin ; zhou hai gang ; zhao hua
..............
page:54-56,71
Research on the Basic Security Solution of VoIP
zhang hui bo ; zhang tie jun ; sun yong jian
..............
page:72-74
The Initiative to Establish Network Security Defense System
huo yan li
..............
page:20-21
Research, improvement and implementation of RBAC model
liu jie
..............
page:48-51
Research on Sampling-Based of Query Processing Approach in Sensor Network
song chun zuo ; zhao hong gang
..............
page:10-13
The Research of CA Authentication System Trust Model Based on PKI
peng jun ; wang zhong ; hu jian chao
..............
page:6-9
An Improved Hybrid Genetic Algorithm for Data Mining Techniques
cui zhi gang
..............
page:63-65
Projection based on temporal logic model checking Intrusion Detection Method
zhu wei jun ; wang zuo ran ; zhou qing lei
..............
page:25-27
Credibility of the system to respond to the emerging network security threats
lu xiao hai
..............
page:4-5