Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecommunications Network Technology
1008-9217
2011 Issue 3
xi men zi qi ye tong xin he hui pu zhong guo qian shu zhan lue he zuo bei wang lu
..............
page:96
lian xin yong yi rong huo awards2010 ji shu chuang xin xiang mu jiang
..............
page:96
ai mo sheng wang luo neng yuan ji xu ling pao tong xin dian yuan shi chang
..............
page:95
Discussion on Web2.0 Security Mechanism
Zhang Weiquan Hu Zhiyuan
..............
page:14-18
Summary of Security Protection for Telecom Network and Internet
Wei Liang Wei Wei
..............
page:5-9
Security Protection of Communications Networks
Feng Yunbo Li Xiangjun
..............
page:1-5
3GPP SA#50 Meeting Report
Liu Rongduo Du Jiadong
..............
page:53-57
Test Analysis of IPv6 Routers in Carrier Network
ZhangHengsheng
..............
page:48-50
xin xi ming zhi xing ye ying yong meng niu guan yi ru jing zhun ying xiao jie jue fang an
..............
page:83-85
feng huo yin ling san wang rong he bei jing xia de da gui mo ftth jian she
zhao
..............
page:91-93
yi guan li jie neng cu di tan yun ying bei jing lian tong jie neng jian pai jing yan qian tan
chen chang dai yin guan wei wang na
..............
page:86-91
Security Assessment Method for Telecom Operator’s Online Service Center and Online Payment System
Hu Shaoyong
..............
page:10-13
Considerations about Security Protection of Communication Network for Operators
Ma Guangyu
..............
page:40-42
rui shi lian bang tie lu gong si xie shou ibm he a er ka te lang xun gai shan fu wu
..............
page:96
Development Trends and Testing Solutions of Datacenter
Li Jiaoming
..............
page:77-82
ji fang zhi leng xi tong jie neng : ai mo sheng zhi dao
..............
page:93-94
gou zhu xin yi dai wang luo an quan ping zhang
lv ying xuan
..............
page:29-31
zhong xing tong xun ptn gao zhi liang cheng zai zhong guo lian tong hspa+ ye wu
..............
page:76
han guo kt xuan ze a er ka te lang xun gou jian ip wang luo
..............
page:13
si bo lun tong xin tui chu gao mi du wu xian xin dao fang zhen qi
..............
page:50
Analysis on Current Situation of Supporting Network Security in Telecommunication Industry of China and Discussion on Its Countermeasures
Du Yuejin Wang Weizhe
..............
page:43-47
zhong xing tong xun zhao kai di yi ci wu lian wang da hui
..............
page:76
zhong xing tong xun shou jia wan cheng lian tong ptn shi yan wang wai chang ye wu ge jie yu ce shi
..............
page:76
dui jia ting wang luo jian yi shu itu-tk.74 de jie shao
wang yan ping yuan yuan zhang xia
..............
page:51-52
2011 xin xi ming zhi ji yi dong ying yong qu dao shang da hui zhao kai
..............
page:85
zhong duan shu ju ying yong ce shi xu qiu ji fang an
liu zuo
..............
page:73-76
ntt docomo shi yong ixia wu xian jie jue fang an cheng gong fa bu xi~(tm) fu wu
..............
page:82
Inspiration from A/H1N1 on Trojan Detection and Prevention
WuHaimin
..............
page:35-39
ai mo sheng liebert hipulse u xi lie ups: he xin ji fang dong li shou hu shen
..............
page:94-95
he nan yi dong hei ji zhan zhuan ti fen xi
li xue wen zhao cheng dong zhang yu chen
..............
page:67-72
a er ka te lang xun fa bu zhuan bian yan jiu bao gao di er ban
..............
page:13
Standards and Telemedicine Service
Nie Xiuying
..............
page:31-35
Experience Summary of Network Security Protection in China Telecommunication
Hou Jijiang
..............
page:19-24
ru he bao zheng yun ji suan de an quan
ankur chadda
..............
page:58-62
Internet Surfing Billing Complaint Case Analysis of Roaming Users in PS Domain, Core Network——Shanghai Mobile Communications Co., Ltd.
Wei Peng Hu Yue Jiang Jie
..............
page:63-67
hua wei ri ben yuan gong ping an quan li qiang xiu tong xun
..............
page:82
Researches on the Operation Model and Security Model of Collaborative Spectrum Sensing in Wireless Cognitive Sensor Network (WCSN)
Lang Weimin
..............
page:25-28