Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2009 Issue 4
In electronic payment password technology application (part 1)
GUAN Zhen-sheng;LI Xiao-feng
..............page:前插1
An audio zero-watermark algorithm based on hybrid domain
LV Hong-wei;ZHANG Hui-mei;CHENG Peng
..............page:3
Netflow Data Statistic System based on Data Stream Model
LIANG Feng;TAN Jian-long;LIU Ren-ren;ZHANG Zhi-bin
..............page:69
Construct Active network se curity protection system
GE Qing-lin;LI Jing;WANG Ying-ying
..............page:66
guan yu ccra xie ding de si kao
li chao ; li qiu xiang
..............page:64
Research of the Application of Cryptography in WaterMark
Xiong Xiang-guang;Jiang Tian-fa
..............page:61
Application of RSA public-key cryptography system in PGP
LIU Xiao-juan;DU Yan-hui
..............page:58
A New Public-key Encryption Scheme Without Random Oracles
zhou li ; jiang tian fa
..............page:55
IPSec VPN data transmission
Fan Yong-qing
..............page:52
A Fault Injection Attack against certain types of SPN structures
LI Juan-ru;GU Da-wu;ZHANG Yuan-yuan
..............page:48
The application of the public key cipher system in the on-line bank
WANG Wen-Bo;DU Yan-Hui
..............page:43
The Applying of Cryptology in Network Security
Li Wen-feng;Du Yan-hui
..............page:40
Image Watermarking Based on Geometric Invariance
PENG Huan;JIANG Tian-fa
..............page:36
Researching of Electronic Business Security Model Based on Web security
LIU Ming-hua;REN Zhi-kao;DONG Hong-can
..............page:33
Development of the Encryption Technology of Computer Cryptography
LV Xing-feng;JIANG Yu
..............page:29
Overview of Image Scrambling Transformation
SHAO Li-ping;MENG Qing-zhao;LI Chun-mei;WANG Xu
..............page:22
The quantum privacy communication searches learns
HUANG Fan;LIU Yu
..............page:19
Generalized key inquisition
WANG Yong
..............page:17