Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2016 Issue 10
Design and Implementation on Multilevel Security Mandatory Access Control System for Virtual Machine Based on BLP
CHI Yaping;JIANG Tingting;DAI Chuping;SUN Wei;Communication Engineering Department;Beijing Electronic Science and Technology Institute;School of Communications Engineering;Xidian University;
..............page:1-7
Multiple View Cooperative Visual Analytics of Network Operation Log
WANG Jinsong;HUANG Jingyun;ZHANG Hongwei;NAN Huirong;School of Computer and Communication Engineering;Tianjin University of Technology;Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology;National Engineering Laboratory for Computer Virus Prevention and Control Technology;
..............page:8-14
Research and Application on Cloud Security Management Service for Intelligent Terminal
WANG Lianyin;WEI Yinghao;XING Shuangqiu;LU Chao;Information Center of the General Administration of Quality Supervision Inspection and Quarantine of the People’s Republic of China;China Quality Information Maintenance;
..............page:15-20
Identity-based Authenticated Protocol without Bilinear Pairing
SHI Min;YE Weiwei;OU Qingyu;91551 Troops of PLA;Department of Information Security;Naval University of Engineering;
..............page:21-27
Research on Method of Key Words Quick Search in Encrypted Databases
XIANG Junzheng;XIAN Hequn;TIAN Chengliang;LI Min;College of Computer Science and Technology;Qingdao University;The State University of Pennsylvania;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:28-33
A Network Behavior-based Access Control Model
LIU Chang;HE Jingsha;School of Software;Beijing University of Technology;
..............page:34-39
Research on DDoS Attack Effect Evaluation Based on TOPSIS-GRA Integrated Evaluation Method
ZHAO Chengliang;LI Aiping;JIANG Rong;College of Computer;National University of Defense Technology;
..............page:40-42+46
Research on Formalized Description of Application Security
ZHANG Mingde;BI Maning;WANG Shun;ZHANG Qingguo;China Volant Industry Co.;Ltd;The Third Institute of Ministry of Public Security;People’s Public Security University of China;Standardization Administration of PRC;
..............page:47-53
Research on Location Privacy Protection Based on Dummy Locations in Mobile Internet Environment
WU Shasha;XIONG Jinbo;YE Guohua;YAO Zhiqiang;Faculty of Software;Fujian Normal University;Fujian Engineering Research Center of Public Service Big Data Mining and Application;College of Mathematics and Computer Science;Fujian Normal University;
..............page:54-59
Research on an Intelligent Local Mobile Cloud Resource Allocation Mechanism
LIU Jinyang;WANG Xingwei;HUANG Min;School of Computer Science and Engineering;Northeastern University;School of Software;Northeastern University;School of Information Science and Engineering;Northeastern University;
..............page:60-68
A Pretreatment of DPI System Based on the Cache Hit
MA Yuepeng;LIU Jiqiang;WANG Jian;School of Computer and Information Technology of Beijing Jiaotong University;
..............page:69-75
Research of Data One-way Transfer Reliability Based on Fiber Optic Communication Technology
SHAO Xudong;JIANG Haiping;ZHANG Han;Information Security Technology Division;The Third Research Institute of Ministry of Public Security;China railway;
..............page:76-79
Review of Android Malware Detection
LIN Jiaping;LI Hui;State Key Laboratory of Integrated Service Networks;Xidian University;School of Cyber Engineering;Xidian University;
..............page:80-88
2016 nian 8 yue wang luo an quan jian ce shu ju fa bu
gao sheng ; zhu zuo zuo ;
..............page:92-93