Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2013 Issue 10
Cloud Storage-oriented Access Control Service
JIANG Wei-yu;LIU Li-min;ZHA Da-ren
..............page:34-37
Security Analysis and Improvement of an Authentication Protocol for SIP
QIN Wen-xian;WANG Qiong-xiao;GAO Neng;WANG Yue-wu
..............page:5-7
The Characteristics and Countermeasures of VoIP Crime
QIU Yue
..............page:209-210
A Group Signature Scheme based on Conic Curve in Finite Field GF(2n)
ZHANG Zhen-tian;CHEN Chi-xie;WANG Biao
..............page:112-114
Research on Access Control and Security Audit of SDC
WANG Di;MA Ya-dong
..............page:132-135
Research on the Wireless Network Security of Code Division Duplex System
LI Geng;ZHAO Yu-ping;SUN Chun-lai;XIAO Ru-wu
..............page:71-74
2013 nian 8 yue wang luo an quan jian ce shu ju fa bu
wen sen hao ; zhu zuo zuo
..............page:237-238
Reseach on Bit Security of Similar Knapsack Difife-Hellman Problem
LI Wei;LV Ke-wei
..............page:121-123
A Cloud Storage-based Database Secure Backup System
LI Xin
..............page:47-49
The Data Analysis Study of Network Crimes based on Tacit Knowledge Mining
MA Ding;LIU Jian-jun;GONG Xue
..............page:200-202
2012 Analysis Report on Development Situation of Anti-virus Products and Mobile Security Products
CHEN Jian-min;CAO Peng;REN Jian-zhong
..............page:215-218
Security Situation and Developing Trend of Mobile Phone
LIANG Hong;XIE Wan-yong;QIN Bo
..............page:75-77
Modeling of Android Application Security Testing
FAN Yuan;LING Xiao
..............page:84-86
ExplorationofLegislationonChinaMobileInternetSecurityRegulation
LIU Wei-jun;HOU Yu-chen
..............page:225-228
Build Active Defense System based on Whitelisting
ZHANG Xiang-ling;WANG Huan
..............page:188-190
Prevention Policy of SQL Injection based on HMAC
PENG Yang
..............page:195-196
Application of Digital Signature and Encryption in Network Isolation
LI Xuan;WU Qi-cong
..............page:178-180
Research on Framework Design of Industrial Control System for Cyber-Security Defenses
CHEN Ya-liang;YANG Hai-jun;YAO Qin-feng;DAI Qin-yun
..............page:57-59
Design of Packet Security Inspection Engine for Reconifgurable UTM
WEI Xing-jun;TANG Zhi-bin;YUAN Jian-guo
..............page:138-140
Security Problems of WeChat
LI Yan-jun
..............page:185-187
2013 nian 8 yue ji suan ji bing du yi qing fen xi
li dong ; du zhen hua
..............page:235-235
Implementation of Information Security on Perceptual Layer in Internet of Things
ZHANG Qiang;LIU Yi;ZHAO Jia
..............page:63-64
Active Cloud Services Safety Monitoring System of Server
ZHAO Ming;JIANG Xiao-qiang
..............page:69-70
2012 Development of Computer Virus and Anti-virus Technology Trend
REN Jian-zhong;ZHANG Xin
..............page:211-214
The Cloud-based Network Security Event Monitoring System
MU Xiang-kun;ZHAO Chen-fei;HUO Ying-dong;TANG Zhao-dong
..............page:8-10
The Security Evaluation and Defending Work of Mobile SMS Network
ZHOU Ming;CHANG Xia
..............page:14-16
A Combination of Active and Passive Security Mechanism for Wireless Ad Hoc Network
WANG Ying-mei;SUN Chun-lai;ZHAO Li-jun
..............page:191-194
An Encryption Algorithm Application Solution
LI Zheng-min;JIAO Ying-nan;HU Ming-chang
..............page:99-100
A Security Management and Control Scheme for Portable Storage Devices based on RFID
WANG Qiu-chen;WANG Lei;XIA Lu-ning
..............page:65-68
Analysis of Mobile Internet Security
WANG Li-lu;WANG Hong-yu
..............page:91-94
iPhone-oriented Electronic Data Forensics
HE Ying-rui;LU Dao-hong;LI Jian-xin;XU Yun-feng
..............page:87-90
The Optimization and Implementation of Data Flow Security Checking Algorithm
ZHANG Hua-ling;CHEN Xiao-jun
..............page:173-177
Analysis of Depth Assessment of Information System Security Technology
XIA Bing;LI Xiang-dong;ZHENG Qiu-sheng;WANG Zhi-qi
..............page:130-131
Research on eID Virtual Identity Data Storage
DENG Lu;HAN Wei-hong;LIU Dong;XIONG Ying
..............page:101-103
Research on Hospital Information System Security Classiifed Protection
XIN Jun-yi;CHEN Qi-yue;WANG Hong-yu
..............page:31-33
Research of Tendency Algorithm for Chinese Comments based on Machine Learning
ZHOU Jun;HE Li;HAN Wei-hong;DENG Lu
..............page:164-166
Practice on Defense System of Smart Power Grids Information Security
WANG Zhi-qiang;GONG Xiao-gang;WANG Hong-kai;XIA Wei
..............page:60-62
Research on Cloud Computing, SDN and Security Technology
HU Zhang-feng;GUO Chun-mei;BI Xue-yao
..............page:40-43
xu
..............page:4-4
Research on Anti-attacking Detection Method in Mini-Electronic Security Device
LI Feng-hai;ZHANG Bai-long;LIU Wan;CHEN Chang-min
..............page:115-117
Research on the NRS and Network Management Mechanism
ZHANG Bi-ying
..............page:219-221
Survey of Packet Cable Security
ZHANG Li-qin;WANG Zhi-qian
..............page:167-169
Research on Authentication Mechanisms in Cloud Computing
ZHU Rong-hua;GAO Neng;XIANG Ji
..............page:54-56
Identity and Access Management Cloud Technology for Large Organizations
WU Li-hui;CHEN Ming-qi;XIANG Ji
..............page:50-53
A Quantitative Assessment Scheme on OTP Generation Algorithm
ZHU Peng-fei;YU Hua-zhang;LU Zhou;FU Hai-yang
..............page:118-120
The Security Threats and the Countermeasures Analysis of the Key Infrastructures
HAO Wen-jiang;WU Jie;WANG Wei
..............page:11-13
Research on the Method of Effectiveness Evaluation for Information Security System
ZHANG Bai-long;LI Feng-hai;LIU Lei;SONG Yan
..............page:229-231
2013 nian 8 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049
..............page:236-236,238
Research and Implementation of Host-based ICSP on-site Evaluation Tool
ZHANG Jian;CHANG Qing;ZHOU Hong-kai;ZHAO Xue-ming
..............page:21-23