Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2014 Issue 11
Research and Design on Offensive and Defensive Feedback Defense Graph on Cloud Desktop
HUANG Ru;,LI Zhong-xian;,LUO Shou-shan;
..............page:1-7
Authenticated Encryption Modes Based on Block Ciphers
CHEN Chang-song;,HU Hong-gang;,ZHANG Ping;
..............page:8-17
Authentication and Image Spatial Encryption Based on Ergodic Matrix and Hybrid Key System
DUAN Yu-cong;,FENG Wen-long;,LI Yi-hong;,ZHOU Xiao-yi;
..............page:18-25
An Information Hiding Method Based on BCH Coding
YAN Chao;,YU Ming;
..............page:26-29
Research on Chinese Text Appraisive Classification in the Present Era of Big Data
WANG Jing-zhong;,ZENG Fan-feng;,ZHU Wan-shan;
..............page:30-35
Multi-level File Operations Recording System Based on Minifilter Driver
LIU Liang;,QING Lin-bo;,ZHANG Chen-lei;,ZHOU An-min;
..............page:41-45
Mechanism on Computer Access Permission Management Based on the Mobile Clients' Dynamic Password Algorithm
CHENG Jiu-jun;,LIAO Jing-xue;,YANG Yang;,ZHANG Qing-yang;
..............page:46-51
The Design and Research of Rootkit Detection System Based on Windows API
GONG Zheng;,HUANG Geng-xing;,YUAN Yu-heng;
..............page:52-58
Exploration and Practice of Using Typical Software Vulnerabilities Based on Windows
GUAN Tong;,REN Fu-li;,WEN Wei-ping;,ZHANG Hao;
..............page:59-65
Research on SQL Injection Vulnerabilities Detection Technology Based on Proxy Mode
CUI Bao-jiang;,WEI Cun-tang;,ZHAO Jing-ling;
..............page:66-69
Second-order SQL Injection Attack Defense Model
LI Xue-shuang;,TIAN Yu-jie;,ZHANG Hai-chuan;,ZHAO Ze-mao;
..............page:70-73
Research and Implementation of Android Software Protection Based on SMC
LI Lin;,LIU Nian;,XU Jia-le;,ZHANG Xiao;
..............page:74-78
2014 nian 9 yue ji suan ji bing du yi qing fen xi
li dong ;, meng bin ;
..............page:92-92
2014 nian 9 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............page:93-94
2014 nian 9 yue wang luo an quan jian ce shu ju fa bu
chen yang ;, dang xiang lei ;
..............page:95-96