Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2012 Issue 7
po jie qi ye yi dong xin xi hua an quan kun ju
..............
page:F0002-F0002,1
Research of Mobile Phone Security Technology
zhang hai yan
..............
page:72-74
An Improved RFID Authentication Protocol Based on Hash-Chain
ma qiao mei
..............
page:62-64,20
Auction mechanism for packet forwarding routing model and simulation study
xu ming xia
..............
page:56-59
The Research of Secret carrier security——Improve the comprehensive secret vector safety management
li ye zuo ; yang li
..............
page:25-28
Research of wireless LAN security technology
li ye zuo
..............
page:32-35
Design of Database Security Solution Schema Based Virtual-User
wang feng ; zhang xin jian
..............
page:12-15
Improvement in Distributed Data Storage Scheme for Wireless Sensor Networks
wang xue jun
..............
page:5-7
The Next Generation Firewall:Network Security defending technology analysis
lin hong
..............
page:29-31
Analysis of computer network security technology
wei peng kuan
..............
page:16-17
wang yin wei shi an quan xing dong yue huo dong zai jing qi dong
..............
page:4-4
The application of nagios network monitoring system with the method of fetion alarming in enterprises
yang chang wu ; cao long han
..............
page:42-45
Jingbian gas purification plant common fault analysis of automatic control instrument loops
hou lei ; liu qing jun ; wu xiao hua ; yao li rui ; zhao hai xia
..............
page:49-52
Study of deploying on the campus network management system of online behavior
xing xue mei ; liu jian feng
..............
page:60-61
Exploration of new features in HTML5
song fei zuo
..............
page:40-41
Mechanism of User interest,model Updating based on Ebbinghaus-Forgetting theory
han xiao ji ; liu feng ming
..............
page:68-71
To promote college students' Information Quality Educationby changing the teaching mode of computer
zou li kun ; li cun ; yang cai feng
..............
page:65-67,45
Construction and Application Research of Government Data Disaster Recovey Center
zhou zhou ; zhang ya
..............
page:21-24
Data Mining and Analysis of Special Behaviors on Network Communication
zhao ru ying ; zhang xiao fei ; zhang dao yin ; zhang zhi ming
..............
page:8-11
The Design of Automatic Categorization System Model of Public Security Information Based on SVM
tan min ; fan qiang
..............
page:46-48
Research on Security and Protection of Campus Wireless Network
chang wei peng
..............
page:75-76,24
A Optimization Method Based on Genetic Algorithm for Solving TSP
han feng jiao
..............
page:36-39
Research and Implementation of keyboard shortcuts function in ATC
bai hong li
..............
page:53-55
The Application of ECDSA In the E-Commerce
han song ; ma fei ; li pei
..............
page:18-20
Analysis Of American policing and new information technology
kuang zuo
..............
page:77-80