Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2016 Issue 4
Research on the Technology of Malware Behavior Monitoring Based on LKM System Call Hijacking
DING Yong;CAO Wei;LUO Senlin;Information System and Security & Countermeasures Experimental Center;Beijing Institute of Technology;
..............page:1-8
Reversible Data Hiding in Encrypted Image Based on Additive Homomorphism and Multi-level Difference Histogram Shifting
XIAO Di;WANG Ying;CHANG Yanting;ZHOU Jiaqi;College of Computer Science;Chongqing University;
..............page:9-16
Research of Virtual Trusted Cryptography Module’s Secret Key Management Based on the Trusted Root Server
WANG Guan;YUAN Huahao;College of Computer;Beijing University of Technology;Beijing Key Laboratory of Trusted Computing;
..............page:17-22
Research on Network Security Situation Prediction Technique Based on Online Learning RBFNN
XUE Limin;LI Zhong;LAN Wanwan;Information Institute;Naval Command College;
..............page:23-30
A Leakage Resilient Authenticated Key Exchange Protocol Based on the CAFL Model
LU Siqi;FAN Shuhui;HAN Xu;CHENG Qingfeng;Luoyang University of Foreign Languages;State Key Laboratory of Cryptology;School of Computer Science and Technology;Xidian University;
..............page:31-37
Survey on PUF-based RFID Anti-counterfeiting Techniques
JIANG Zhengjun;TIAN Haibo;ZHANG Fangguo;School of Data and Computer Science;Sun Yat-sen University;Guangdong Provincial Key Laboratory of Information Security;
..............page:38-43
(k,n) Threshold Quantum Secret Sharing Scheme Based on the Generation of Reed Solomon Code
CHENG Zi;JIN lirong;SHI Jinjing;College of Information Science and Engineering;Central South University;
..............page:44-49
Research on Data Placement Strategy for Ceph Based on File Level
LIU Sha;CHU Chuanren;School of Communication Engineering;Hangzhou Dianzi University;
..............page:50-54
Speaker Recognition Algorithm Based on Convolutional Neural Networks
HU Qing;LIU Benyong;College of Big Data and Information Engineering;Guizhou University;Institute of Intelligent Information Processing;Guizhou University;
..............page:55-60
Research on the Method of Message Forwarding Path Extraction in the Analysis of Microblog Public Opinion
ZHOU Hongfu;JIA Lu;ZHANG Tingting;LI Jian;School of Computer;Beijing University of Posts and Telecommunications;
..............page:61-68
Research on Security Issues of Wireless Access in Public Environment
LI Qing;YE A-yong;XU Li;College of Mathematics and Computer Science;Fujian Normal University;
..............page:69-75
Research on Security Technology of Mobile Network
CHANG Yingxian;CHEN Guangyong;SHI Xinlei;HU Hengrui;State Grid Shan Dong Electric Power Company;The Third Research Institute of Ministry of Public Security;
..............page:76-81
2016 nian 2 yue ji suan ji bing du yi qing fen xi
zhao xiao ming ; liu wei ;
..............page:82
2016 nian 2 yue wang luo an quan jian ce shu ju fa bu
rao zuo ; zhang teng ;
..............page:85-86
wang yu dong tai
..............page:87-90