Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2011 Issue 6
Security Strategies of constructing a LAN Based on the Switch Technology
Meng Li
..............
page:21-22,20
tiao chu soc kan soc
..............
page:4
The scheme on the corporate data security protection
Wang Yongxiang
..............
page:12-14
Based on INGW correspondence money owed risk control function design
Yang Jun
..............
page:52-54
Cooperate with Webpage Tamper-proof System deployed website Content Management System reconstruction Scheme
Ye Yang
..............
page:58-60
Security Performance Analysis and Authentication Protocol of EAP-AKA in WIMAX
Hu Debin;Hu Ping;Jiang Qiming
..............
page:15-17
University Library Electronic Reading Room Network Security Problems and Solutions
Li Bangqun
..............
page:43-45
Robustness research on Object Tracking Algorithm Based on SIFT Feature
Liu Hongshen;Zhang Chuanwen
..............
page:9-11
Study on Mechanism of Privilege Management for Geographic Information Sharing Platform
Liu Zhihong;Wang Shandong;Li Lingmei
..............
page:30-33
Secure electronic voting scheme based on Harn partial blind signature
Xu Ling
..............
page:18-20
Analyses Influence the Network Information Safety Factor and Its Preventive Measures
Zhu Jun
..............
page:28-29,17
System Security Solutions of RFID System of Internet of Things Sensing Layer
Lei Jing;Chen Jing
..............
page:34-36
Analysis Digital Rights Management Status and Development
Xue Hui;Deng Jun
..............
page:75-77
An anonymous buyer -seller watermarking protocol based on Elliptic Curve Cryptography
Wu Qiang;Bian Ba Wang Dui
..............
page:78-79,60
Enlightenment of Theory of Network-centric Warfare on Military Preparedness of PLA
Gao Yan
..............
page:69-71
The Applied Research of Exam System on Website Science Dissemination of National Defence knowledge
Bai Xuemei
..............
page:61-62,65
the Development Periods for the Internet of Things and its Key Technology
Huang Xiaoqiao;Yang Yanqing
..............
page:63-65
The Application of the Association Rule Mining Model in the Growth of Teachers
Gao Xiaohong;Chai Yinping
..............
page:49-51
Naive Bayes Classification Algorithm improved Based on attribute weighted
Liu Niu
..............
page:72-74
Gateway of Wireless Sensor Network Based on VM in Heterogeneous Environment
Pei Qingqi;Ning Beng;Wu Yang;Yang Liang;Yin Hao;Tang Hong
..............
page:5-8
Summary of Technology of Cloud computing
Peng Anxin;Shi Lei
..............
page:66-68
rui xing zhu li zheng qi wang luo an quan da zao " zong he li ti fang du " ti xi guo wu yuan mou ju fang bing du an li
..............
page:封2,1
Study on Net work Security System of Vocational College
Mao Fangming
..............
page:46-48
Analysis of Network Safety and Guard
Muheyat.Niyazibek;Gulishawuli.Talp
..............
page:26-27
xin xi dong tai
..............
page:80,封3,封4
Study on Improving the Clustering Algorithm
Bo Wenyan;Fu Wenlan;Zhang Fengying
..............
page:23-25
Study of the Grid Application Technology on Digitalization Campus Based on the Regional Education Resource Sharing Mechanism
Zhou Kejiang;Huang Yue;jiang Hua;Luo Qin
..............
page:55-57
The Applications of KVM over IP technologyin the meteorological business network
Zhou Jie;Zhou Xiang;Ma Qiwei
..............
page:40-42
An Improved Anneal Arithmetic in The Application of LEACH Clustering Mechanism
Xu Weike
..............
page:37-39