Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2014 Issue 10
A Model of Source Code Security Investigation Based on Trusted Computing Technology
HAO Mei-ci;,WANG Liu-cheng;,WANG Wei;,ZHANG Yi;
..............page:1-6
An Improved Method of MP3 Passive Forgery Detection
FAN Meng-di;,GAO Xiong-zhi;,REN Yan-zhen;,YANG Jing;
..............page:7-10
Research on Code Protection Method for Android Applications
SUN Qi;,WU Shuang;,XU Jian;,ZHOU Fu-cai;
..............page:11-17
Research on Signature Extraction Algorithms for Mobile Applications
CHEN Yi-fu;,LIU Ji-qiang;
..............page:18-23
Research and Analysis on 3G-WLAN Security Access Scheme
HUANG Yu-luo;,LI Xiao-guang;,MA Chun-guang;,MIAO Jun-feng;
..............page:24-30
Introduction and Analysis of Adobe Flash Player Vulnerabilities
MA Yang-yang;,MENG Zheng;,WEN Wei-ping;,ZENG Tian-ning;
..............page:31-37
Research on Flow Identification System Based on DPI
JIANG Chao-hui;,WU Guang-da;
..............page:44-48
Research on the Technology of Webpage Extraction Based on VIPS and Vague Dictionary
LIU Jia-yong;,Qing Lin-bo;,WU Qian;
..............page:49-53
Research on Parameter Selection of a Code-based Public-Key Cryptosystem
CAI Qing-jun;,XU Quan-zuo;
..............page:54-58
Anonymous Attribute-based Encryption Supporting Attribute Matching-Test
HE Yu-ju;,LIAN Ke;,ZHAO Ze-mao;
..............page:59-63
The Design and Implementation of Firewall Policy Audit Plan Based on Improved Strategy Tree
GUO Yu-peng;,LU Yun-long;,LUO Shou-shan;
..............page:64-69
Research and Design of Security Audit Log System Based on Web Application
DUAN Juan;,MA Yu-wei;,XIN Yang;
..............page:70-76
Research on Remote Trust Authentication in the Virtual Computing Platform
LIU Yi;,ZHENG Zhi-rong;
..............page:77-80
A Study of Invulnerability of Small World Network and the Correlation of Betweenness-Degree
GUO Xin-ling;,GUO Zheng;,NIE Ting-yuan;,SONG Chuan-wang;
..............page:81-85
Design of the Classified Document Reader Based on Face Authentication
XU Ji-jun;,YANG Yu-hang;,ZHANG Li-chao;,ZHU Kun-song;
..............page:86-91
2014 nian 8 yue ji suan ji bing du yi qing fen xi
ma tian cheng ;, meng bin ;
..............page:92
2014 nian 8 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin ;
..............page:93-94
2014 nian 8 yue wang luo an quan jian ce shu ju fa bu
bai liang ;, li shi zuo ;
..............page:95-96
xin xi dong tai
..............page:97-100