Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2015 Issue 11
Research on No Bilinear Pairing Fuzzy Keyword Search Encryption in Cloud
QIN Zhi-guang;,BAO Wen-yi;,ZHAO Yang;,XIONG Hu;
..............
page:1-6
Research on VT-d based Virtual Machine Isolation Framework
YANG Yong-jiao;,YAN Fei;,YU Zhao;,ZHANG Huan-guo;
..............
page:7-14
A New Cloudware PaaS Platform Based on Microservices Architecture
GUO Dong;,WANG Wei;,ZENG Guo-sun;
..............
page:15-20
Research and Application of Cloud Computing Tenant Virtual Machine Active Trusted Verify Mechanism
TAO Zheng;,HU Jun;,Wu Huan;,Yang Jing;
..............
page:21-26
Research on Security of IoT Perception Layer Based on Node Authentication
ZHANG Yu-ting;,YAN Cheng-hua;,WEI Yu-ren;
..............
page:27-32
Research on the Evaluation Method of AS-IP Declaring Relationship Authenticity
HU Zhao-ming;,LIU Lei;,SHANG Bo-wen;,ZHU Pei-dong;
..............
page:33-39
A New Secret Handshakes Scheme Based on Chaotic Maps
WANG Wen-bo;,CHENG Qing-feng;,LU Si-qi;,ZHAO Jin-hua;
..............
page:40-46
Design and Implementation of Stateful Firewall Based on Software-deifned Networking
LIU Qi;,CHEN Yun-fang;,ZHANG Wei;
..............
page:47-52
Research and Design of Web Application Firewall Based on Feature Matching
XIN Xiao-jie;,XIN Yang;,JI Shuo;
..............
page:53-59
A Document Clustering Algorithm Based on Dirichlet Process Mixture Model
GAO Yue;,WANG Wen-xian;,YANG Shu-xian;
..............
page:60-65
Research on LBS(P,L,K) Model and Its Anonymous Algorithms
ZHANG Fu-xia;,JIANG Chao-hui;
..............
page:66-70
A Structured Data Protection Method for Geographic Information System
JI Chen;,LI Xiao-qiang;,LIU Qian;
..............
page:71-76
Analysis of An Enhanced Apriori Algorithms in Data Mining
HU Xue;,FENG Hua-min;,LI Ming-wei;,DING Zhao;
..............
page:77-83
Research on Evaluation Model and Its Veriifcation of IT Emergency Response Capabilities of the People,s Bank of China Based on G1 and Entropy Method
ZHENG Lu-jun;,WEI Ru-hao;,WANG Dong;,TIAN Jia-xi;
..............
page:84-89
2015 nian 9 yue ji suan ji bing du yi qing fen xi
liu wei ;, huang shuo ;
..............
page:90-90
2015 nian 9 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............
page:91-92
2015 nian 9 yue wang luo an quan jian ce shu ju fa bu
zhao hui ;, dang xiang lei ;
..............
page:93-94
dang zheng ji guan shi ye dan wei he guo you qi ye hu lian wang wang zhan an quan zhuan xiang zheng zhi xing dong dian shi dian hua hui yi zai jing zhao kai
..............
page:95-95
di jiu jie zhong guo ke xin ji suan yu xin xi an quan xue shu hui yi zai xi an ju xing
..............
page:96-96
2015 xin xi hua ying yong guo ji hui yi zuo di er jie zhong e xin xi an quan ji shu gao feng lun tan zai mian yang zhao kai
..............
page:97-97
zhong guo mi ma xue hui 2015 nian hui zai shang hai cheng gong zhao kai
..............
page:98-98