Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2014 Issue 8
A New Network Authentication Scheme based on Biometric Recognition
LV Qiu-yun;,WANG Yu-na;
..............page:1-5
An Overview on the Secure Program Obfuscation
CHENG Rong;,ZHANG Fang-guo;
..............page:6-16
Security Analysis and Improvement of ID-based Proxy Signature
ZHANG Jian-hong;,ZHEN Wei-na;
..............page:17-20
The Research of Session Attack and Investigation Method
XU Guo-tian;
..............page:21-27
AnDa:a Dynamic Analysis System for Malicious Code
LIU Kun;,REN Wei;,ZHOU Jin;
..............page:28-33
Modeling and Simulation of Rational Cryptographic Protocols based on Swarm
CHEN Ning-jiang;,YANG Xue-jun;
..............page:34-39
Algorithm of Chinese Keywords Extraction based on Multi-feature
LIN Meng;,LUO Sen-lin;,PAN Li-min;,WU Jun-hua;
..............page:40-44
Mobility Model for Opportunistic Network based on Community Tier
MA Chun-guang;,MIAO Jun-feng;,QI Feng;,ZHOU Yong-jin;
..............page:45-49
The Research of NTP Protocol Communication Middleware based on the NESSUS
DU Chun-lai;,WANG Bao-cheng;,WANG Jing-zhong;,WANG Qing-liang;
..............page:50-54
The Analysis of the Security Strategy based on Process Management
YAN Cheng-hua;,YANG Chun-hui;
..............page:61-66
A Hybrid Authentication Service System for 2D Barcode in O2O Application
TANG Chun-ming;,ZHANG Yong-qiang;
..............page:67-70
Safety Assessment on Digital Radio Transmission based on Attack Tree Model
LI Hui;,LIU Jian-yi;,ZHANG Ru;,ZHAO Jing;
..............page:71-76
A Filtering Method of Images based on a Simple Background Change Rules
LIU Jian-zhong;,LIU Xin-rong;
..............page:77-81
Study on Trust Evaluation Method in WSNs based on Repeated Games
CHEN Jian-jun;,FANG Jie;,YANG Jun-wei;,ZHANG Shi-bin;
..............page:82-87
The Research of a New Distributed Website Condition Monitoring Mechanism
LIANG Lin;,XIA Ye-chao;,XIA Zheng-min;,YANG Da-lu;
..............page:88-91
2014 nian 6 yue ji suan ji bing du yi qing fen xi
meng bin ;, zhang rui ;
..............page:92-92
2014 nian 6 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............page:93-94
2014 nian 6 yue wang luo an quan jian ce shu ju fa bu
bai liang ;, zhang teng ;
..............page:95-96