Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2013 Issue 2
Hot standby application of video conferencing
Yi Lanqing;Yang Jinmin;Qin Jinrong;Sun Rongyan;Zhang Dahao
..............page:73-76
Based on "Technology+System" Campus Network Management Method
Mo Hongming;Cai Yongzhi
..............page:40-41
A Audit Method of Mandatory Access control Mechanism
Wang Lei
..............page:13-15
A Traffic Classification and Application Network Framework for ISPs
Fan Quanrun;Pan Feng
..............page:16-18,22
Analysis of the Dual Network Isolation in Meteorological Bureau of Shaanxi Province
Jia chengang;Li Zhen;Wang Lei;Chen Jia
..............page:71-72
The Web Server of College Security Policy
Cong Peili
..............page:37-39,44
The Model of Message Distribution Pipeline based on The Lock-free Queue Algorithm
Bai Zheng;Zhang Hongyu;Wang Ping
..............page:10-12
xin wen ji zuo
..............page:80
Integrating N-PMIPv6 and Synchronous Bindings Avoid Packet Loss in NEMO
Du Longyang;Liang Xiaocheng
..............page:31-33
Exploring the Security Management of Cloud Computing
Zhang Zhongsheng
..............page:34-36,70
Research for Bluetooth Security
Yan Xiaofeng
..............page:51-54,47
Multi-level domain protection system based on Information security classification iden-tifies
Lin Wenmei;Miao Pinzhang;Weng KunPeng;Wang Mei;Fang yan
..............page:27-30
Research of Electronic Authentication Token Security
Yan Xiaofeng
..............page:23-26,30
The Comparision between Digital Signature based on SM2 and ECDSA
Sun Rongyan;Cai Changshu;Zhou Zhou;Zhao Yanjie;Yang Jinmin
..............page:60-62
Security Analysis of RFID Systems
Hu Guosheng;Fang Longxiong
..............page:19-22
dong ruan fa bu an quan yun
..............page:4
Local Search Immunization Strategy in P2P Networks
Dong Hongbo;Li Wei
..............page:5-7,12