Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2011 Issue 6
tiao chu soc kan soc
..............page:4
The scheme on the corporate data security protection
Wang Yongxiang
..............page:12-14
Security Performance Analysis and Authentication Protocol of EAP-AKA in WIMAX
Hu Debin;Hu Ping;Jiang Qiming
..............page:15-17
Robustness research on Object Tracking Algorithm Based on SIFT Feature
Liu Hongshen;Zhang Chuanwen
..............page:9-11
Study on Mechanism of Privilege Management for Geographic Information Sharing Platform
Liu Zhihong;Wang Shandong;Li Lingmei
..............page:30-33
Analysis Digital Rights Management Status and Development
Xue Hui;Deng Jun
..............page:75-77
the Development Periods for the Internet of Things and its Key Technology
Huang Xiaoqiao;Yang Yanqing
..............page:63-65
The Application of the Association Rule Mining Model in the Growth of Teachers
Gao Xiaohong;Chai Yinping
..............page:49-51
Gateway of Wireless Sensor Network Based on VM in Heterogeneous Environment
Pei Qingqi;Ning Beng;Wu Yang;Yang Liang;Yin Hao;Tang Hong
..............page:5-8
Summary of Technology of Cloud computing
Peng Anxin;Shi Lei
..............page:66-68
Study on Net work Security System of Vocational College
Mao Fangming
..............page:46-48
Analysis of Network Safety and Guard
Muheyat.Niyazibek;Gulishawuli.Talp
..............page:26-27
xin xi dong tai
..............page:80,封3,封4
Study on Improving the Clustering Algorithm
Bo Wenyan;Fu Wenlan;Zhang Fengying
..............page:23-25
The Applications of KVM over IP technologyin the meteorological business network
Zhou Jie;Zhou Xiang;Ma Qiwei
..............page:40-42