Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2013 Issue 3
The Confidential Transmission System based on the Physical Layer Characteristics of Wireless Channel
HUANG Cheng;ZHAO Nan;GUO Kai-tai;GUO Wan-li
..............
page:40-44
Excel Macro Virus Analysis and Prevention
TENG Ping
..............
page:45-49
Sensitive Information Input Safety Technology
FU Jian-ming;LI Peng-wei;LI Jing-wen
..............
page:82-85
Research on Hash Function Collision Attack and Defense Strategy of SSL Protocol
DUAN Ming;LAI Xue-jia
..............
page:34-36
2013 nian 1 yue ji suan ji bing du yi qing fen xi
guo jia ji suan ji bing du ying ji chu li zhong xin
..............
page:97
Research and Implementations on Large-scale Distributed Honeynet
XU Na;ZHOU Yong-lin
..............
page:21-25
Based on IBM Mobile Agent LAN Information Acquisition and Preprocessor
SHANG Zong-hai;LI Qi;ZHAO Bao
..............
page:64-67
Design and Implementation of the anti-Keyboard and Mouse Recorder
LIU Wen-zhuo;DING Jie;LUO Ji-ming;LI Xin
..............
page:75-78
Research on Authentication in the Cloud Connectivity of Wireless Sensor Networks
LANG Wei-min;CHEN Lin;WANG Hao
..............
page:6-8
2013 nian 1 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............
page:98,100
Failure Detection Algorithm based on Wavelet Transform and Combinational Models for Cloud Computing
CHEN Dan-wei;GUAN Yi-ming
..............
page:2-5
Plaintext Recovery Attack on REESSE1+ Public Key Cryptosystem
FEI Xiang-dong;PAN Yu
..............
page:26-28
Study on OAuth Protocol Security
ZHANG Tian-qi
..............
page:68-70
A New Type of Encryption Algorithm Which is based on Euler Loop Sequence
QI Zhen-yi;ZHENG Xu;LIU Jian-lin
..............
page:29-33
2013 nian 1 yue wang luo an quan jian ce shu ju fen xi
he neng qiang
..............
page:99-100
Design and Implentment of Secure Access Gateway of the Internet of Things based on FPGA
LI Suo-lei;SU Lie-hua;LI Heng-xun
..............
page:61-63
Data Security Mechanism based on RSA Digital Envelope in Android System
XIAO Ping;LI Qian
..............
page:37-39
The Encrypted Database Statistical Method based on Homomorphism Encryption
CHEN Zhi-wei;BAI Jian;YANG Ya-tao;LI Zi-chen
..............
page:12-15
Analysis on Computer Forensic by Using the Structure of Microsoft Compound Document
LUO Wen-hua
..............
page:9-11
guo ji dui kang huan jing xia de wang luo an quan fang hu neng li jian she
du yue jin
..............
page:86-88
Security Detection and Forensics Analysis System on Android
SUN Run-kang;ZHAN Xian;SHAO Yu-ru;QIN Cheng
..............
page:71-74
The Risk Control Mechanism of the Cloud Computing IT Outsourcing
ZHANG Xian-long
..............
page:89-92
xin xi an quan ren cai pei yang ti xi xian zhuang yu tiao zhan
zhang huan guo
..............
page:前插1
A Routing Protocol based on Random Linear Network Coding for Opportunistic Network
XIAO Liang;MA Chun-guang;WANG Jiu-ru;GAO Xun-bing
..............
page:16-20
In Some Countries the Work of CERT Overview and Enlightenment
JIANG Zheng-wei;LIU Bao-xu;JIA Lei-lei
..............
page:93-96
Application and Countermeasure of Anonymous Communication Network in Psychological & Public Opinion Warfare
ZHANG Yu-xiang;SUN Zhen;TIAN Tian
..............
page:55-57
SunDisk-Removable Storage Devices Protection System based Windows
LIANG Gang;ZHOU Jin-song;YANG Lian;LIN Ping
..............
page:50-54
Design and Realization of Digital Certificate Initialization and Unlocking System
DENG Fu-biao
..............
page:79-81
APT Threat Detection and Protection of Integrated Network Space
ZHAI Li-dong;LI Yue;JIA Zhao-peng;GUO Li
..............
page:58-60