Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2015 Issue 6
Research on Double Layer Defense Model for SQL Injection Attack Based on Classification
TIAN Yu-jie;ZHAO Ze-mao;WANG Li-jun;LIAN Ke;Department of Communication Engineering;Hangzhou Dianzi University;
..............page:1-6
A Fuzzy Keyword Search Scheme with Encryption in Cloud Storage
QIN Zhi-guang;BAO Wen-yi;ZHAO Yang;XIONG Hu;School of Information and Software Engineering;University of Electronic Science and Technology of China;
..............page:7-12
Design and Implementation of Monitoring System for Internet QR Code Pictures
XU Jie;JIN Guo-qing;YUAN Qing-sheng;National Computer Network and Information Security Administrative Center;Institute of Computing Technology of the Chinese Academy of Sciences;
..............page:13-18
Research on Authentication of WiFi-WiMAX Heterogeneous Wireless Network
HUANG Hai;XIE Dong-qing;SONG Yi-zan;Department of Mathematics and Information Sciences;Guangzhou University;Department of Computer Science & Education Software;Guangzhou University;
..............page:19-25
An Encryption Communication Scheme Based on Hardware in Circuit-Switched Domain
LI Yuan;ZHOU Wei-hua;SHAN Xu;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:26-32
Research on Homomorphic HASH System for Anti-PollutionAttack Based on Network Coding
CHEN Fu-zhen;CHENG Jiu-jun;LIAO Jing-xue;SHAO Jian-yu;Department of Computer Science & Engineering;Tongji University;Key Laboratory of Embedded System and Service Computing of Ministry of Education;Tongji University;
..............page:33-40
Research on DCP-ABE Scheme Supporting Attribute Reuse
LIAN Ke;ZHAO Ze-mao;WANG Li-jun;HE Yu-ju;College of Communication Engineering;Hangzhou Dianzi University;
..............page:41-46
Null Pointer Dereference Detect Based on Judgment Logical in Software Security
WANG Rui-qiang;JIN Da-hai;Institute of Network Technology;Beijing University of Posts and Telecommunications;
..............page:47-54
Research on Image Watermarking Algorithm Based on Quantum Haar Wavelet Transform
MOU Qun-gang;JIANG Tian-fa;LIU Jing;School of Computer Science;South-Central University for Nationalities;
..............page:55-60
Research and Design on Security System of Wireless Mesh Network
LUO Xun;YAN Cheng-hua;Department of Information Security;Naval University of Engineering;
..............page:61-66
Research on Cloud Forensics Model under the Simulation DDoS Attack Scenarios
LI Jie;XU Xin;CHEN Yu;ZHANG Ding-wen;Jilin Grid Electric Power Research Institute of China Grid;College of Computer Science and Technology;Jilin University;
..............page:67-72
The Microblogging User Influence Assessment Based on PageRank and User Behavior
ZHANG Jun-hao;GU Yi-jun;ZHANG Shi-hao;School of Cybersecurity;People’s Public Security University of China;
..............page:73-78
A Kind of Online Trust System Based on the Situation of China
GU Qing;XIE Chao;FENG Si-feng;Shanghai Pu Hua Integrity Information Technology Co.;Ltd.;
..............page:79-84
Research on the Software Security Testing for Potential Defects
FENG Ji-zhou;TIAN Ming-hui;China Electronics Technology Group Corporation No.38 Research Institute;
..............page:85-90
2015 nian 4 yue ji suan ji bing du yi qing fen xi
xu chang peng ; meng bin ;
..............page:91
2015 nian 4 yue wang luo an quan jian ce shu ju fa bu
ji yu chun ; xiao chong hui ;
..............page:94-95