Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2012 Issue 5
The Capture of Conventional Intrusion
ZHU Feng;XIAO Li;GUO Kai
..............
page:46-47
The Security Challenges of the Opportunistic IoT
GUO Bin;YU Zhi-wen;ZHANG Da-qing;WANG Zhu
..............
page:68-69,77
A Kind of Embedded Radius Module Access Control Technology Research
DONG Jian-feng;ZHANG De;ZHAI Yin-chuan
..............
page:39-42
A Proof about the Information Entropy of Volley Markov Source in Network
WANG Xiao-ou;LI Lin
..............
page:7-9
Study on Industrial Control SCADA System\'s Information Security Protection System
YU Yong;LIN Wei-min
..............
page:74-77
Analysis and Application for NAF Encoding Methods
HUANG Shi-zhong;YANG Hong-guang
..............
page:4-6,35
A Kind of New Proxy-Protected Signature based on Polynomial Over Finite Fields
YIN Xiao-tian
..............
page:32-35
2012 nian 3 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............
page:98,100
Research in the Application of 915.0MHz RFID Chips in Internet of Things
WANG Lei
..............
page:64-67
The Solution of Key Migration Model and the Sealed Key Migration based on the Trusted Storage
WANG Guan;LI Yan;ZOU Na
..............
page:17-19,26
Research on Key Technologies of Monitoring Public Opinions in Colleges based on the Web
WANG Cheng-ye;ZHANG Xiao-yu;XUE Qin
..............
page:85-87
Virtualization System Security Research and Analysis
GAN Hong;PAN Dan
..............
page:43-45
2012 nian 3 yue wang luo an quan jian ce shu ju fen xi
zhang hong
..............
page:99-100
Some Comments on Cybercrime-Scene and the Site Processing of Electronic Data
LI Zhe;MA Ding
..............
page:48-51
Intrusion Tolerant System and the Key Mechanisms
SU Zhong;LAI Jiang-rong;YU Bin;ZHAO Fei
..............
page:78-80
The Research of Trojan Horse Technology and Investigation Method on Differential Backup and Cookie Injection
XU Guo-tian
..............
page:10-14
Software Implementation of Digit Encryptions Module
LIU De-xiang
..............
page:15-16,51
Application of Web Scan Web Spider Technology Research
ZHOU Da
..............
page:20-23
Research on the Legal System of Internet Public Opinion Monitoring
WEI Zhi-qiang;OUYANG Xu
..............
page:81-84
xin xi dong tai
..............
page:封2-封3,96
2012 nian 3 yue ji suan ji bing du yi qing fen xi
liu wei ; meng bin
..............
page:97
Association Analysis of Typical Detection Points and Control Points in Host Security Detection
JIANG Yu;KONG Qing-yan;WANG Yi-nan;LI Jun;REN Jian
..............
page:1-3,14
A Study of Security Architecture and Technical Approaches in Internet of Things
REN Wei
..............
page:70-73
Integrated Information Security Monitoring and Evaluation System Design based on the Classified Protection
LI Chun-wu;WU Jian-wen
..............
page:92-95
One Kind based on the USB Key Encryption and Decryption Technology Software Protection Scheme
WANG Wei
..............
page:52-58,67
Research on Defend Against DDoS Attacks
CHI Shui-Ming;ZHOU Su-hang
..............
page:27-31
Design and Analysis of Network Security Protection System based on Intrusion Tolerance
HOU Li-bo
..............
page:24-26
AIX5.3/6.1 Heap Exploitation Mechanisms Analysis
LAO Wei
..............
page:36-38,91
The Study of Mobile Phone Forensics Normalization
DING Hong-jun
..............
page:88-91
Android System based on Mobile Phone Privacy Information Security Research and Implementation
ZHANG Jing-jing;YAN Xiao-wei;CAI Jian-shun;GUO Shu-guang
..............
page:59-63