Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2011 Issue 10
Bypass Technique Under the Environment of Network Security Risk Research
LIU Zhi;QIAN Lu-feng;LU Jing-tai
..............page:32-33
The Online Auction for Privacy Protection
YOU Yong-xing
..............page:73-74
Information Security Protection Program in Cloud Computing Era
LI Yan-bin;SUN Song-er
..............page:17-18
National Public Health Data Center Security Construction Resear
DING Hong-bin;XIAO Ge-xin
..............page:71-72,77
Google Web Security Testing Tools-Skipfish Source Code Analysis
ZHANG Wei;LIU Wen-qing;CHEN Xing-yi
..............page:34-37
Computer Virus Analysis of 2011 September
LIU Wei;MENG Bin
..............page:97-97
Cloud Computing Environment Simulation Computer Forensics
ZANG Jun;MAI Yong-hao
..............page:7-9,12
The Security Transmission Solution Based on the CPK
YU Yong;MANG Chun-sheng;WANG Shou-wu;CAI Jian-shun
..............page:60-61,64
Cloud Computing and Cloud Security in the United States
ZHAO Yan-lin;LI Zhan-bao
..............page:83-87
Ten Critical Vulnerabilities Analysis Report September 2011
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............page:99-100
Process Hiding and Treating Strategy of Various Windows Trojan
FENG Tian-shu;XU Xue-dong
..............page:52-55
Review of the Path-based Algorithm on Network Reliability
GAO Hui-sheng;ZHAN Jing-yu;WANG Bo-ying
..............page:28-31
Research on The Information Security Technology of Network Fusion
ZHANG You-yang;DONG Jian-feng;ZHANG Hong-Jun;MEI Yue
..............page:25-27
Design and Implementation of Common Evaluating Model of DBMS Security
FANG Zhou;HUANG Jun-qiang
..............page:91-93
Security Problems in the Internet of Things and Their Solutions
PENG Yong;XIE Feng;GUO Xiao-jing;SONG Dan-jie;LI Jian
..............page:4-6
Network Security Monitoring Data Analysis Report of 2011 August
WANG Ying-kang
..............page:98-98,100
xin xi dong tai
..............page:40,87,94,封4,前插1
Cloud Computing Information Security Risk Research
NIE Yuan-ming;AN Jing;Wen Hui
..............page:15-16
The Research on Security Mechanism for Wireless Shadow Networks
LI Li;DONG Jian-feng;JIA Lei-lei
..............page:19-20
Study on Information Security based Cloud Computing Model
ZHENG Chang-xing
..............page:13-14
An Analysis on the Security of Quantum Cryptography
LIU Xiao-fen
..............page:68-70
Study on Applications and Security of Logistics Information System Based on Cloud Computing
YANG Jun;ZHOU Dao-ming;ZHANG Ming
..............page:10-12