Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2011 Issue 12
A Study on Image Restoration Based on Stochastic Resonance in Bistable System
DING Wei-jie;ZHANG Qi-qian;CHEN Zhe-jian
..............page:36-39
Study on Authentication Protocols for Wireless Sensor Network
CHEN Yu;WANG Jin-dong
..............page:46-47,71
Video Surveillance System Problems and Solutions
SONG Tao
..............page:76-79
The Oracle Database SQL Injection Technology Research
CHEN Jin
..............page:80-83
Research on Security Framework for Personal Cloud Computing
ZHENG Yuan;JIANG Wei;JIANG Tian-fa
..............page:72-75
Study on Computer Forensics on Windows Operation System
Maierdan Abula;Yasen Aizezi
..............page:24-26
Researching on Anti-Occupying Channel by Setting NAV Twice
LI Lei;YI Ping
..............page:31-35
Transparent Encryption Technology Research
ZHOU Dao-ming;QIAN Lu-feng;WANG Lu-lu
..............page:54-56
A Proxy Signature Scheme Based on MPKC
LI Zhi-Xing;XU Chun-gen
..............page:48-50
A Survey of Digital Signcryption
LI Fa-gen;ZHONG Di
..............page:1-8
Computer Virus Analysis of 2011 November
LIU Wei;MENG Bin
..............page:93
Design and Realization of the File Safe Transmission System Based on Ad Hoc Network
FENG Jian-chuan;YAN Cheng-hua;DU Yi-kun
..............page:57-58,88
Forensic Analysis of Windows Deleted Files
ZHAO Zhi-yan;HUANG Shu-hua
..............page:61-64
Research on the Security Authentication Protocol of Data Communication Based on EPC Internet of Things
WANG Qiong;SUN Rui-bing;WANG Liang-min;WAN Ke
..............page:20-23
Google Bigtable System Reliability Research
WEI Bing;YAO Min;SHEN Zhi-rong
..............page:27-30,39
Based on the FUZZING Lead to a New Mining Method Based on Windows Kernel Vulnerability
YAO Hong-bo;YIN Liang;WEN Wei-ping
..............page:9-16
Analysis of Smart Phone Security and Protection
ZHANG Ting;ZHANG Hui-ji
..............page:65-68
Embedding and Security Test Based on Singular Value Decomposition on Video Watermark
JIANG Wei;YAN Hao;XIONG Xiang-guang;JIANG Tian-fa
..............page:43-45
SQLI and XSS Security Vulnerabilities Research
YAN Hao;JIANG Wei;JIANG Tian-fa
..............page:51-53