Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2013 Issue 2
Hot standby application of video conferencing
Yi Lanqing;Yang Jinmin;Qin Jinrong;Sun Rongyan;Zhang Dahao
..............
page:73-76
Based on "Technology+System" Campus Network Management Method
Mo Hongming;Cai Yongzhi
..............
page:40-41
A Audit Method of Mandatory Access control Mechanism
Wang Lei
..............
page:13-15
Design of Courseware Copyright Protection System based on System based on Visible Watermarking
Peng Kaihui;Gui Rongzhi;Yuan Hui
..............
page:8-9
Logistics Center Location Algorithm Based on Improved Particle Swarm Optimization
He Qiongyue;Yang Wei
..............
page:55-57
A Traffic Classification and Application Network Framework for ISPs
Fan Quanrun;Pan Feng
..............
page:16-18,22
Analysis of the Dual Network Isolation in Meteorological Bureau of Shaanxi Province
Jia chengang;Li Zhen;Wang Lei;Chen Jia
..............
page:71-72
ji huo gong ying lian hang tian xin xi erp li zhu zhou cheng ye qi wen hui sheng
..............
page:1
The Web Server of College Security Policy
Cong Peili
..............
page:37-39,44
The Model of Message Distribution Pipeline based on The Lock-free Queue Algorithm
Bai Zheng;Zhang Hongyu;Wang Ping
..............
page:10-12
Highway toll collection system in network security monitoring system architecture analysis
Li Jun
..............
page:45-47
xin wen ji zuo
..............
page:80
Integrating N-PMIPv6 and Synchronous Bindings Avoid Packet Loss in NEMO
Du Longyang;Liang Xiaocheng
..............
page:31-33
The new outlook of Public Security Intelligence——concept transformation and value exploration
Yu Chenxi
..............
page:58-59,62
Exploring the Security Management of Cloud Computing
Zhang Zhongsheng
..............
page:34-36,70
Research for Bluetooth Security
Yan Xiaofeng
..............
page:51-54,47
Multi-level domain protection system based on Information security classification iden-tifies
Lin Wenmei;Miao Pinzhang;Weng KunPeng;Wang Mei;Fang yan
..............
page:27-30
Research of the Module of High-Speed Packet Capture based on Multi-Core Architectures and Multi-Transceiver Queue
Qi Zhansheng;Lin Liyou
..............
page:63-66,70
The design and implementation of generating rapidly common document based on XML
Wang Liangcheng;Tan Lu
..............
page:48-50
Research of Electronic Authentication Token Security
Yan Xiaofeng
..............
page:23-26,30
Research on the construction of information security literacy evaluation index system
Yang Zhenying;Wan Qiuyi
..............
page:67-70
The Comparision between Digital Signature based on SM2 and ECDSA
Sun Rongyan;Cai Changshu;Zhou Zhou;Zhao Yanjie;Yang Jinmin
..............
page:60-62
Security Analysis of RFID Systems
Hu Guosheng;Fang Longxiong
..............
page:19-22
dong ruan fa bu an quan yun
..............
page:4
Heterogeneous data exchange engine design based on XML
Wei Le
..............
page:42-44
Local Search Immunization Strategy in P2P Networks
Dong Hongbo;Li Wei
..............
page:5-7,12
cai shui hu lian hang tian xin xi erp bei kao mi lao tou shi pin hao wei dao
..............
page:封2
Brief Discussion of Several Measures to Promote Digital Evidence in Public Security
Liu Jianjun
..............
page:77-79