Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2011 Issue 5
Application and Research of Web Log Mining
Hu Hongzhi;Wang Hua
..............page:77-78
The Development of Broadband Network
Yang Wei
..............page:4-5
The Research of Hybrid Encryption in DNSSEC
Shan Kangkang;Jiang Xiaoqiang
..............page:48-50
RFID System Security Research
Li Zhenshan
..............page:61-63
Analysis and Reasearch of Digital Signature Technology
Yang Liguo;Ou Funa;Zhao Jing;Wu Shangqing
..............page:64-66
The Analysis and Implementation of PKI Trust Model Based on LAN
Ji Xiaoyu;Xiao Feng
..............page:25-27
xin xi dong tai
..............page:79-80,封4
Research of Using Thread Pool Technique
He Jie
..............page:58-60
Research on Technology of Cell Phone Forensic
Liu Yangyang
..............page:31-33
Reflection on "ghost" system security
Zhang Jianwei
..............page:56-57,20
The Security Framework about the Internet of Things
Peng Chunyan
..............page:13-14
Detection of illegal AP campus WLAN
Zhong Jiuzhou
..............page:42-43,70
Research on Standardization of Information Security Incident Based on IDMEF
Tang Xianyan;Zhu Xinghui;Sheng Lixin;Chen Xiaozhen;Cheng Jieren
..............page:21-24
Research and Implementation of Uniform Identity Authentication based on SOA
Liu Richu;Jiang Rong;Zhang Yihao
..............page:74-76