Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2016 Issue 5
Research on An Effective Integrity Check Scheme for Big Data Center
LI Hongjun;LANG Weimin;DENG Gang;PLA Institute of National Defense Information;PLA 68056 Troops;
..............page:1-8
Overview on Physical Layer Security Issues in Multiple Antennas System
ZHANG Tao;LIU Qiao;LI Hui;The Fifty-forth Institute of CETC International CO.LTD;Xidian University;
..............page:9-14
The Construction of a Type of Ideal Access Structures
LI Zhihui;XU Tingting;ZHANG Na;College of Mathematics and Information Science;Shaanxi Normal University;
..............page:15-22
Design and Implementation of IDS Device Detection Tool
SHI Guozhen;ZHANG Meng;FU Peng;SU Mang;Beijing Electronic Science & Technology Institute;IT Academy;Xidian University;IT Academy;Nanjing University of Science and Technology;
..............page:23-29
Research on Hierarchical Identity-based Encryption Management System in Cloud Computing
JI Haiping;XU Lei;YU Xiaoling;XU Chungen;Department of Applied Mathematics;Nanjing University of Science and Technology;
..............page:30-36
Research on Authentication Scheme of Cryptographic Service System Based on Service Architecture
YE Weiwei;OU Qingyu;BAI Xiaowu;Department of Information Security;Naval University of Engineering;Xiangyang Municipal Public Security Bureau;
..............page:37-43
A New Ultra-lightweight RFID Mutual Authentication Protocol
MA Qing;GUO Yajun;ZENG Qingjiang;XU Duo;School of Computer Science;Central China Normal University;Beijing Police College;
..............page:44-50
Research on Different Versions of YAFFS2 File Recovery Algorithm Based on Hash
LI Yameng;HE Jingsha;School of Software Engineering;Beijing University of Technology;
..............page:51-57
A New AdHoc Group Key Agreement Scheme Based on HECC
HE Guangrong;WANG Xueming;College of Big Data and Information Engineering;Guizhou University;College of Computer Science and Technology;Guizhou University;
..............page:58-63
Research on Short Text Representation Based on Sentential Semantic Components
SHANG Hai;LUO Senlin;HAN Lei;ZHANG Ji;Information System and Security & Countermeasures Experimental Center;Beijing Institute of Technology;
..............page:64-70
Design and Implementation of the Scheme of Obfuscation Based on the Recombination of the Android Executable File
WEN Weiping;ZHANG Han;CAO Xianglei;School of Software&Microelectronics;Peking University;
..............page:71-77
Survey on Smart Grid Security
LIU Jianan;WENG Jian;School of Information Science and Technology;Jinan University;
..............page:78-84
2016 nian 3 yue ji suan ji bing du yi qing fen xi
liu wei ; ma tian cheng ;
..............page:85
2016 nian 3 yue wang luo an quan jian ce shu ju fa bu
liu zuo ; wang xiao qun ;
..............page:88-89
ke lai tong guo cmmi3 ren zheng
..............page:92