Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2013 Issue 12
Research on Authentication Method of Hadoop Cloud Computing Platform based on SAML
CUI Bao-jiang;,ZHU Shao;
..............
page:1-5
Research on Security Technology of Mobile Network in Software Architecture
CHEN Zhen;,LIU Hong-jian;,XU Jian-lin;,YU Yi-fan;
..............
page:6-9
Hadoop DDos Attack Detection Algorithm Analysis
CUI Bao-jiang;,LAN Yun;,ZHANG Nai-bin;,ZHAO Jing-ling;
..............
page:10-12
Research and Analysis of P2P Security Protection Mechanism
HUANG Liu-sheng;,LIU Fei;,LUO Yong-long;,MA Yuan;
..............
page:13-15
Application of Dynamic Taints Analysis Technology in Vulnerability Detection of ActiveX Controls
CUI Bao-jiang;,CUI Hua-liang;,LAN Yun;
..............
page:16-19
Campus Activity Sensing and Sharing based on Mobile Crowd Sensing
GUO Bin;,HUANGFU Shen-long;,NAN Wen-qian;,YU Zhi-wen;
..............
page:20-23
Research on Public-Key based Cryptosystems for Secure Data Aggregation in Dynamic Wireless Sensor Network
LU Wei-long;
..............
page:24-28
Research and Design on Detection System for Secret Data based on Desktop Cloud
CHEN Jian-hua;,HONG Ming-quan;
..............
page:29-32
An Efifcient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
HE Zhi-ling;,LUO Wen-jun;,WANG Bao-min;
..............
page:33-36
The Network Account Identity Authentication System based on Voiceprint Recognition and Speech Recognition
BAI Sen;,LI Qiu-hua;,TANG Jian-bo;,ZHU Gui-bin;
..............
page:37-41
The Anti-leak Password Management System based on Bluetooth and NFC
WU Xiao-dao;,XU Meng-lin;,YAN Zhi-tao;,ZHAO Hui;
..............
page:42-45
di si jie yun an quan lian meng gao feng lun tan zai jing zhao kai
yang chen ;
..............
page:45-45
The Mobile Intelligent Terminal Malware Analysis and Detection System based on Behavior
BAI Jing;,CAI Wang;,KANG Wen-dan;,ZHAN Xian;
..............
page:46-50
Research on Mining Network Comments based on Feature Clustering
NIE Jin-hui;,SU Hong-qi;,ZENG Zhi;
..............
page:51-54
Research on Analysis of User Activity based on IconCache.db
LUO Wen-hua;
..............
page:55-57
A New Detection Method of Abnormal Network Behavior based on the Packet Content
WANG Bao-cheng;,WANG Gong-cong;,WANG Jing-zhong;
..............
page:58-61
Network Fraud Suspects Tracking System based on Keystroke Biometric Identiifcation
CHEN Guang-rui;,GUO Lei;,HU Xiao-qin;,JIANG Tian-yu;
..............
page:62-66
Analysis of Decrypting One Encrypted vbs Trojan
JIN Yu-rong;,XIE Yi-xin;,YANG Yi;,ZHANG Bo;
..............
page:67-70
An Automatic Identiifcation System with Applications in Holter Monitoring
BAO Shu-di;,FU Yong-hui;,LIU Xiao-dong;,LU Yang;
..............
page:71-74
Application of Model-based Development Method in Multi-Application Smart Cards
GUO Jian;,ZHANG Yue;,ZHU Xiao-ran;
..............
page:75-79
The Rumor Spreading Mechanism of Network and Countermeasures
CAO Jin-xuan;,Li Si-qi;,WANG Ren-hua;,XU Yun-feng;
..............
page:80-83
di 15 jie guo ji xin xi yu tong xin an quan hui yi zhao kai
wu jing ;
..............
page:83-83
Dynamic and Static Forensics
ZHANG Zhen-ning;
..............
page:84-86
Sonic Network Management System based on CORBA
WANG Bin-jun;,ZHANG Wei;,ZHU Yan-jun;
..............
page:87-89
Research on Digital Data in the New Telecommunication Fraud
HUANG Zheng;,LIU Jian-jun;,XIONG Dao-quan;,ZHAO Bin;
..............
page:90-92
2013 nian 10 yue ji suan ji bing du yi qing fen xi
liu yan ;, meng bin ;
..............
page:93-93
2013 nian 10 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............
page:94-94,96
2013 nian 10 yue wang luo an quan jian ce shu ju fa bu
ji yu chun ;, li zhi hui ;
..............
page:95-96
2013 nian zong mu ci
..............
page:97-100