Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2009 Issue 4
In electronic payment password technology application (part 1)
GUAN Zhen-sheng;LI Xiao-feng
..............
page:前插1
An audio zero-watermark algorithm based on hybrid domain
LV Hong-wei;ZHANG Hui-mei;CHENG Peng
..............
page:3
zheng shi lou dong feng xian fang fan xin xing bing du
he shi ping
..............
page:77
zheng fu bu men xin xi xi tong an quan feng xian fen xi yao dian tan jiu
yuan yi fang
..............
page:74
Design anti Implementation of Boot Password Based on The BIOS Software Module
TIAN Zheng;LV Hong-li
..............
page:72
Netflow Data Statistic System based on Data Stream Model
LIANG Feng;TAN Jian-long;LIU Ren-ren;ZHANG Zhi-bin
..............
page:69
Construct Active network se curity protection system
GE Qing-lin;LI Jing;WANG Ying-ying
..............
page:66
guan yu ccra xie ding de si kao
li chao ; li qiu xiang
..............
page:64
Research of the Application of Cryptography in WaterMark
Xiong Xiang-guang;Jiang Tian-fa
..............
page:61
Application of RSA public-key cryptography system in PGP
LIU Xiao-juan;DU Yan-hui
..............
page:58
A New Public-key Encryption Scheme Without Random Oracles
zhou li ; jiang tian fa
..............
page:55
IPSec VPN data transmission
Fan Yong-qing
..............
page:52
A Fault Injection Attack against certain types of SPN structures
LI Juan-ru;GU Da-wu;ZHANG Yuan-yuan
..............
page:48
Authentication protocol against the Man-in-the-middle Attack
LI Yan-ping
..............
page:45
The application of the public key cipher system in the on-line bank
WANG Wen-Bo;DU Yan-Hui
..............
page:43
The Applying of Cryptology in Network Security
Li Wen-feng;Du Yan-hui
..............
page:40
Image Watermarking Based on Geometric Invariance
PENG Huan;JIANG Tian-fa
..............
page:36
Researching of Electronic Business Security Model Based on Web security
LIU Ming-hua;REN Zhi-kao;DONG Hong-can
..............
page:33
Development of the Encryption Technology of Computer Cryptography
LV Xing-feng;JIANG Yu
..............
page:29
Study on the application of Cryptography technology in Information network security
WANG Jing-wei;GUO Ying-min
..............
page:27
Overview of Image Scrambling Transformation
SHAO Li-ping;MENG Qing-zhao;LI Chun-mei;WANG Xu
..............
page:22
The quantum privacy communication searches learns
HUANG Fan;LIU Yu
..............
page:19
Generalized key inquisition
WANG Yong
..............
page:17
Under electronic commerce environment password law difficult position
FENG Li-yang
..............
page:14
Anti-quantum computation public key password demand analysis and technical route
GUAN Hai-ming
..............
page:10
The Network Information Encrpytion Tachniques Analyse
Meng Yang
..............
page:7
Several kind of resistance network security risk encryption technology
SHENG Shui-yuan
..............
page:5