Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecommunications Technology
1000-1247
2006 Issue 5
Security Application of SOC in Telecom Network
Yang Yixian;Zhou Yajian
..............
page:16-18
Enhancing the Construction of Network and Information Security, Constructing "Green" Network
Yin Haibo
..............
page:13-15
Current Status of National and International Network and Information Security
Huang Yuanfei
..............
page:20-23
Standards Research Status of Network and Information Security
Wei Liang
..............
page:24-27
ying dui tiao zhan , jian quan an quan bao zhang ti xi
dai zhong
..............
page:28-30
Realization and Deployment of IDC Network Security Value-added Service
Li Hong;Xu Wenxiu
..............
page:31-33
3g ji zhong guan jian ji shu dui xi tong rong liang de ying xiang
wu xiang
..............
page:68-70
ji yu vxworks cao zuo xi tong de wang guan xi tong de shi xian
wu bing mei ; li hong mei ; zeng zhi min
..............
page:71-75
chang ju li gao su guang chuan shu xi tong zhong de bian ma diao zhi ge shi
gan chao qin
..............
page:76-78
Designation and Realization of NAT-PT
Zhong Jin
..............
page:79-82
mscml ru he xie tong qi ta xie yi kai zhan duo mei ti ying yong
Eric Burger
..............
page:83-84
Research Progress of Coding, Naming and Addressing
Zhang Jie
..............
page:86-89
Solution of Mobile Value-added Real-time Billing Service
Liang Yi;Hu Bin
..............
page:90-94
mian xiang dian xin yun ying shang de ji shi tong xin ye wu tan tao
huang ming shi
..............
page:95-97
yi dong dian shi guang bo 3g wang luo de sha shou ji ying yong
zheng zhi
..............
page:99-100
Mitigation Techniques of Denial of Service Attack
Liu Weiwei;Bao Xiuguo
..............
page:34-36
ai li xin wang luo an quan zi xun fu wu ce lue
xu jing zuo
..............
page:37-39
Realization of IP Backbone in 3G Network
Li Jingchuan
..............
page:40-41
dui zhong guo yi dong xin bi "**139*" xin ye wu hao de shang que he lian xiang
pan qian hong
..............
page:42-44
Construction Strategy of BOSS Disaster Recovery
Hu Guohui;Chen Peihai
..............
page:45-47
Realization Strategy of Disaster Recovery in MISC System
Jiang Feng
..............
page:52-55
zai 5ess jiao huan ji shang shi xian sccp dong tai fu he fen dan
chen zuo
..............
page:60-62
chuan shu dian lu guan li xi tong de shi xian
lou de ming
..............
page:63-64
zong he ye wu fu wu kai tong xi tong jian she mo shi fen xi
yan lei
..............
page:65-66
HSDPA Technology and Its Evolution Trend
Zhao Shaogang
..............
page:102-105
Accurate Planning Discussion of WCDMA Network under Complex Environment
Ren Dingjun
..............
page:106-108
jian she yu yun ying wcdma wang luo mian lin de tiao zhan ji ying dui ce lue
mou hai wang
..............
page:109-111
3g wang luo bu shu yao zhuo yan wei lai
da fang
..............
page:112-114
hong feng wo fu gai qu yu de 3g hua wu mo xing ji zu wang jie jue fang an
zhao yu
..............
page:115-117
td-scdma xi tong pin lv gui hua fang fa fen xi
wang zhuo ; song li jun ; yu shun yong
..............
page:119-123
ru he jin xing you xiao de node b ruan jian xi tong ce shi
dai zuo
..............
page:124-126
zuo ling xian de tong xin ce shi fang an ti gong shang fang si bo lun tong xin zi shen fu zong cai sheth parag
da fang
..............
page:127-128
Technology of Data Duplication in BOSS Disaster Recovery System and Its Options
Tong Min
..............
page:48-51