Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2013 Issue 3
The Confidential Transmission System based on the Physical Layer Characteristics of Wireless Channel
HUANG Cheng;ZHAO Nan;GUO Kai-tai;GUO Wan-li
..............page:40-44
Excel Macro Virus Analysis and Prevention
TENG Ping
..............page:45-49
Sensitive Information Input Safety Technology
FU Jian-ming;LI Peng-wei;LI Jing-wen
..............page:82-85
2013 nian 1 yue ji suan ji bing du yi qing fen xi
guo jia ji suan ji bing du ying ji chu li zhong xin
..............page:97
Research and Implementations on Large-scale Distributed Honeynet
XU Na;ZHOU Yong-lin
..............page:21-25
Based on IBM Mobile Agent LAN Information Acquisition and Preprocessor
SHANG Zong-hai;LI Qi;ZHAO Bao
..............page:64-67
Design and Implementation of the anti-Keyboard and Mouse Recorder
LIU Wen-zhuo;DING Jie;LUO Ji-ming;LI Xin
..............page:75-78
Research on Authentication in the Cloud Connectivity of Wireless Sensor Networks
LANG Wei-min;CHEN Lin;WANG Hao
..............page:6-8
2013 nian 1 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............page:98,100
Plaintext Recovery Attack on REESSE1+ Public Key Cryptosystem
FEI Xiang-dong;PAN Yu
..............page:26-28
Study on OAuth Protocol Security
ZHANG Tian-qi
..............page:68-70
A New Type of Encryption Algorithm Which is based on Euler Loop Sequence
QI Zhen-yi;ZHENG Xu;LIU Jian-lin
..............page:29-33
2013 nian 1 yue wang luo an quan jian ce shu ju fen xi
he neng qiang
..............page:99-100
Design and Implentment of Secure Access Gateway of the Internet of Things based on FPGA
LI Suo-lei;SU Lie-hua;LI Heng-xun
..............page:61-63
The Encrypted Database Statistical Method based on Homomorphism Encryption
CHEN Zhi-wei;BAI Jian;YANG Ya-tao;LI Zi-chen
..............page:12-15
Security Detection and Forensics Analysis System on Android
SUN Run-kang;ZHAN Xian;SHAO Yu-ru;QIN Cheng
..............page:71-74
The Risk Control Mechanism of the Cloud Computing IT Outsourcing
ZHANG Xian-long
..............page:89-92
xin xi an quan ren cai pei yang ti xi xian zhuang yu tiao zhan
zhang huan guo
..............page:前插1
A Routing Protocol based on Random Linear Network Coding for Opportunistic Network
XIAO Liang;MA Chun-guang;WANG Jiu-ru;GAO Xun-bing
..............page:16-20
In Some Countries the Work of CERT Overview and Enlightenment
JIANG Zheng-wei;LIU Bao-xu;JIA Lei-lei
..............page:93-96
SunDisk-Removable Storage Devices Protection System based Windows
LIANG Gang;ZHOU Jin-song;YANG Lian;LIN Ping
..............page:50-54
APT Threat Detection and Protection of Integrated Network Space
ZHAI Li-dong;LI Yue;JIA Zhao-peng;GUO Li
..............page:58-60