Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2015 Issue 6
Research on Double Layer Defense Model for SQL Injection Attack Based on Classification
TIAN Yu-jie;ZHAO Ze-mao;WANG Li-jun;LIAN Ke;Department of Communication Engineering;Hangzhou Dianzi University;
..............
page:1-6
guan yu di 30 ci quan guo ji suan ji an quan xue shu jiao liu hui zheng wen de tong zhi
..............
page:6
A Fuzzy Keyword Search Scheme with Encryption in Cloud Storage
QIN Zhi-guang;BAO Wen-yi;ZHAO Yang;XIONG Hu;School of Information and Software Engineering;University of Electronic Science and Technology of China;
..............
page:7-12
Design and Implementation of Monitoring System for Internet QR Code Pictures
XU Jie;JIN Guo-qing;YUAN Qing-sheng;National Computer Network and Information Security Administrative Center;Institute of Computing Technology of the Chinese Academy of Sciences;
..............
page:13-18
Research on Authentication of WiFi-WiMAX Heterogeneous Wireless Network
HUANG Hai;XIE Dong-qing;SONG Yi-zan;Department of Mathematics and Information Sciences;Guangzhou University;Department of Computer Science & Education Software;Guangzhou University;
..............
page:19-25
An Encryption Communication Scheme Based on Hardware in Circuit-Switched Domain
LI Yuan;ZHOU Wei-hua;SHAN Xu;Institute of Information Engineering;Chinese Academy of Sciences;
..............
page:26-32
Research on Homomorphic HASH System for Anti-PollutionAttack Based on Network Coding
CHEN Fu-zhen;CHENG Jiu-jun;LIAO Jing-xue;SHAO Jian-yu;Department of Computer Science & Engineering;Tongji University;Key Laboratory of Embedded System and Service Computing of Ministry of Education;Tongji University;
..............
page:33-40
Research on DCP-ABE Scheme Supporting Attribute Reuse
LIAN Ke;ZHAO Ze-mao;WANG Li-jun;HE Yu-ju;College of Communication Engineering;Hangzhou Dianzi University;
..............
page:41-46
Null Pointer Dereference Detect Based on Judgment Logical in Software Security
WANG Rui-qiang;JIN Da-hai;Institute of Network Technology;Beijing University of Posts and Telecommunications;
..............
page:47-54
Research on Image Watermarking Algorithm Based on Quantum Haar Wavelet Transform
MOU Qun-gang;JIANG Tian-fa;LIU Jing;School of Computer Science;South-Central University for Nationalities;
..............
page:55-60
Research and Design on Security System of Wireless Mesh Network
LUO Xun;YAN Cheng-hua;Department of Information Security;Naval University of Engineering;
..............
page:61-66
Research on Cloud Forensics Model under the Simulation DDoS Attack Scenarios
LI Jie;XU Xin;CHEN Yu;ZHANG Ding-wen;Jilin Grid Electric Power Research Institute of China Grid;College of Computer Science and Technology;Jilin University;
..............
page:67-72
The Microblogging User Influence Assessment Based on PageRank and User Behavior
ZHANG Jun-hao;GU Yi-jun;ZHANG Shi-hao;School of Cybersecurity;People’s Public Security University of China;
..............
page:73-78
A Kind of Online Trust System Based on the Situation of China
GU Qing;XIE Chao;FENG Si-feng;Shanghai Pu Hua Integrity Information Technology Co.;Ltd.;
..............
page:79-84
Research on the Software Security Testing for Potential Defects
FENG Ji-zhou;TIAN Ming-hui;China Electronics Technology Group Corporation No.38 Research Institute;
..............
page:85-90
2015 nian 4 yue ji suan ji bing du yi qing fen xi
xu chang peng ; meng bin ;
..............
page:91
2015 nian 4 yue shi da zhong yao an quan lou dong fen xi
..............
page:92-93
2015 nian 4 yue wang luo an quan jian ce shu ju fa bu
ji yu chun ; xiao chong hui ;
..............
page:94-95
2015 gui yang guo ji da shu ju chan ye bo lan hui zuo quan qiu da shu ju shi dai gui yang feng hui long zhong kai mu
..............
page:96
di er jie guo jia wang luo an quan xuan chuan zhou ( fa zhi ri ) wang luo an quan zhi shi da jiang tang huo dong shun li ju ban
..............
page:97
2015 zhong guo wang luo kong jian an quan ( shang hai ) lun tan kai mu
..............
page:97
gong an bu zhao kai dian shi dian hua hui yi zu zhi bu shu guo jia ji zhong yao xin xi xi tong he zhong dian wang zhan an quan zhi fa jian cha gong zuo
..............
page:97
di er jie guo jia wang luo an quan xuan chuan zhou qi dong tu chu qing shao nian wang luo an quan jiao yu
..............
page:98
2015 nian zhong guo ji suan ji wang luo an quan da hui zai hu bei wu han zhao kai
..............
page:98
shan shi wang ke liang xiang di er jie guo jia wang luo an quan xuan chuan zhou
..............
page:99
jin shan shou fa xin yi dai qi ye zhong duan an quan ruan jian
..............
page:99
zhong guo mi ma xue hui 2015 nian mi ma suan fa xue shu hui yi zai nan jing zhao kai
..............
page:99
di wu jie quan guo ji suan ji qu zheng ji shu yan tao hui zheng wen ji hui yi tong zhi
..............
page:100