Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2008 Issue 11
P2P network monitor based on active detection technology
Yanfeng Yu;Haiquan Qin;Zhibo Guo
..............
page:76
qu xian qi ye xin yong fu wu ping tai yun ying fang an chu tan
ye lin ; fei zhong zuo
..............
page:80
ji sheng wan xiang wei wang ba chuang zao quan xin jia zhi
..............
page:82
lian xiang wang yu ru qin fang hu xi tong hu hang zheng quan nei wai wang an quan
..............
page:83
2007-2008 nian du xin xi an quan chan pin jian ce gai kuang
zhao zuo ; lin yan ; gu jian
..............
page:84
2008 nian zhong guo ji suan ji bing du yi qing diao cha ji shu fen xi bao gao
zhang jian ; du zhen hua ; zhang zuo ; shu xin ; liang hong
..............
page:86
jiang shi wang luo gui mo cheng fen san hua qu shi
liu bo chao
..............
page:90
wei ruan " hei ping " shi jian jie xi
..............
page:92
Application of Network Simulator Tools on Network Security Experiment
Wang Zeyu;Wang Ning
..............
page:72
Study On Legalization and Implementation Of Using The Real-name Registration In China
Qin Bin;Wang Biao
..............
page:69
qian tan dian zi shang wu ling yu de hei ke fan zui
tang cheng wen ; wang zhao cheng
..............
page:66
Research on Electronic interception technique standard of Occident
Minhu Ma;Chao Li;Hairong Ma
..............
page:62
she ji p2p ruan jian an jian diao cha qu zheng fang fa de yan jiu
guo qiu xiang ; zhu jin yi
..............
page:58
qq deng lu xie yi an quan xing yan jiu yu fen xi
yu kai ; zhang zuo ; wang yong jun
..............
page:55
DPA Resistant Hardware Implementation of AES Based on Masking
Liu Haiqing;Lu Hongyi;Tong yuanman
..............
page:51
An approach to network security situation awareness based on multi-perspective analysis
Tan Xiaobin;ZhangYong;Zhong Li
..............
page:47
A new solution for Anonymous Routers Resolution
Shi Huai-Zhou;Zhu Pei-Dong
..............
page:45
A Trusted Network Connect Model Based on The TPM Chip
Chen Zhihao;Xie Xiaoquan
..............
page:42
The Research on Trustworthy Interconnection Security Architecture between Information Systems
Zou Xiang;Shen Hanhui;Zhou Guoyong
..............
page:39
nong ye bu wang luo fang bing du jie jue fang an
jin shan ruan jian gu fen gong si
..............
page:37
pki zhi cheng shen fen guan li an quan
wei jie
..............
page:35
rong " hui " guan tong fang fan wang luo an quan wei xie hua wei mian xiang web2.0 de zheng ti an quan jie jue fang an
zheng zhi bin
..............
page:33
dian zi shu ju si fa jian ding gai shu
yu yan feng
..............
page:30
ao yun an bao yu xin xi an quan bao zhang
wang xiao cheng
..............
page:29
wang luo an quan ruo gan ji shu nan dian chu tan
yun xiao chun
..............
page:27
wang luo an quan lou dong yan jiu
zhang yu qing
..............
page:24
xin xi an quan yao shen du
li zhan bao
..............
page:22
rsa-08 xin xi an quan guo ji hui yi zhong de re dian wen ti
di qi bin
..............
page:20
ke xin ji suan de yan jiu jin zhan gai shu
qing si han
..............
page:18
shen ru kai zhan xin xi an quan deng ji bao hu gong zuo quan mian luo shi guo jia xin xi an quan deng ji bao hu zhi du
guo qi quan
..............
page:17
jie du mei guo "54 hao guo jia an quan zong tong ling "
cui shu kun
..............
page:16
deng ji bao hu zheng gai de ji shu lu xian
shen chang xiang
..............
page:14
yi xin xi an quan bao zhang cu hu lian wang ying yong fa zhan zhao ze liang fu si chang zai quan guo ji suan ji an quan xue shu jiao liu hui shang de fa yan zhai yao
..............
page:12
ao yun an bao dui wo guo xin xi an quan de tui dong yu jie jian
gu jian guo
..............
page:9
xie shou gong chuang jian kang an quan de wang luo huan jing gong an bu di san yan jiu suo dang wei shu ji cheng lin zai di 23 ci quan guo ji suan ji an quan xue shu jiao liu hui shang de zhi ci
..............
page:8
di 23 ci quan guo ji suan ji an quan xue shu jiao liu hui zai shang hai zhao kai
su hong ; yang chen ; ma hua ; yue zuo yuan
..............
page:6
li zu gong an jian ku chuang ye shen hua chuang xin zai zao hui huang gong an bu di san yan jiu suo dang wei shu ji cheng lin zai jian suo 30 zhou nian qing zhu da hui shang de jiang hua
..............
page:3
gong an bu bu chang zhu li zheng shao dong zai gong an bu di san yan jiu suo jian suo 30 zhou nian qing zhu da hui shang de jiang hua
..............
page:2
guo wu wei yuan gong an bu dang wei shu ji bu chang meng jian zhu zhi xin zhu he gong an bu di san yan jiu suo jian suo 30 zhou nian he xin
..............
page:1