Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2010 Issue 3
Research of an Authentication Protocol Without Trusted Third Party
wang jie ; si zhi gang
..............page:28-30
Architecture Design of Digital Certification System Bases on SysML
li yuan ; ma zi tang
..............page:17-19
Compact Model Analysis of Social Network
li ze jun ; zeng li jun
..............page:57-60
A Self-adaptive Multi-party Non-repudiation Protocol
li lei ; wang yu min
..............page:78-80
Research of multi-mission and high-concurrency data processing platform technique
zhang tao ; li jian ; kang yong jia
..............page:61-62,68
A New ID-based Group Key Management Scheme for Ad hoc
wang meng ; xu ping ge ; gu wei na
..............page:31-33
The safety of social insurance network protection
tang xiang lin
..............page:34-36
Security Analyses and Improvement of WTLS in WAP
yue zuo ; zhu li qiang ; luo yu
..............page:14-16
H.264 Video Compression Technologies and Applications
wang zhong zhen
..............page:45-47
Security Analysis of Teaching Local Area Networks
zhang yong
..............page:52-53
Research and design of a security model based on IDS and Firewall
yu zhi gao ; zhou guo xiang
..............page:22-24
Research and Progress of Quantum Cryptography
gan bin ; zhou hai gang ; zhao hua
..............page:54-56,71
Research on the Basic Security Solution of VoIP
zhang hui bo ; zhang tie jun ; sun yong jian
..............page:72-74
Research on Sampling-Based of Query Processing Approach in Sensor Network
song chun zuo ; zhao hong gang
..............page:10-13
The Research of CA Authentication System Trust Model Based on PKI
peng jun ; wang zhong ; hu jian chao
..............page:6-9
Projection based on temporal logic model checking Intrusion Detection Method
zhu wei jun ; wang zuo ran ; zhou qing lei
..............page:25-27