Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2008 Issue 6
An improved tamper detection algorithm Based on DWT
LI Chun-juan
..............
page:30-32
Application on EAM System Integration Based on SOA
ZHAO Shuang;YANG Jian-feng;LIU Wen-bin
..............
page:33-37
Design and Implementation of Net Proxy Server
Che Kui;Xing Shu-tao
..............
page:38-40
A Secure Transmission System based on RSA Algorithm and Symmetric Encryption Algorithm
LI Wen-sheng
..............
page:41-43
The Implementation of RSA Public-Key Algorithm in Visual C++
Shi Yingying;LI Tao
..............
page:44-46
THE Research and Realization of the Attack Defense on the Web Application
YU Xiao-yi;CHANG Yan;XU Han-wei
..............
page:47-51
Analyse to protective technology of XML Data Safty
SUN Run-gou
..............
page:25-29
The countermeasure and analyses about security of storage technology
WU Hao;YU Jian-guo
..............
page:21-24
A security hashing algorithm for Direct Anonymous Attestation Scheme
MA Xiao;PANG Zi-long;LIU Jing-sen;LIU Ming-li
..............
page:17-20
Analysis of AES's Implementation with FPGA
TANG Jin-yi
..............
page:14-16,20
ji yu you hua bp shen jing wang luo de wsns lu you an quan ping gu mo xing
qing zuo ; zuo chao shu ; liu dan
..............
page:11-13
Communication Efficient Model for DDoS Detection
DIAN Shi-mei
..............
page:7-10
Data transmission program in not reliable channel based on Tornado Codes
HOU Bing
..............
page:5-6,10
Studies on Information Security Evaluation Policies in and outside China
Lü Xin
..............
page:1-4
an quan zi xun
..............
page:103-110
ke xin ji suan san qi kai
qu ding
..............
page:111-112
sheng yin / shu zi
..............
page:插1
The invasion and defense of spam
GAO Qian
..............
page:52-53
A P2P network flow monitoring model based on SNMP
SHI Liang-WU;GU Ke;LI Hong-yan
..............
page:54-56
Based on TCP sequence number forecast safe analysis and guard
XIAO Xi-gang
..............
page:57-58,62
Research on Fuzzy Neural Networks applicating Deception Detection
Yang Dong;Lv Ming-e
..............
page:59-62
Comparative Research of IPSec and SSL VPN lmplementation
MA Chuan
..............
page:63-65
juniper idp: bu shi wu li kan hua
chen dong yu
..............
page:86
rsa fa bu an quan ren zheng guan li ping tai qiang hua xin xi feng xian guan li
duan hong
..............
page:87
mei you te : you jian he an quan bing zhong
duan hong
..............
page:88
jie pu gao xing neng utm xi tong
li jin ku ; ding chang fu
..............
page:89-90
tian rong xin tui chu shou kuan lv se an quan ping tai
..............
page:91-92
ao tu ke ji : gei xu ni wang luo yi ge zhen shi de an quan huan jing
ao tu ke ji gong si
..............
page:93
chan pin
..............
page:94-96
fa lv zhuan jia dan you myspace hei ke liang xing
qian dui zhan
..............
page:97
qi ye wang an quan guan li yu ce lue
liu chang ming
..............
page:98-100
Disk Data Recovery by Modify MBR
DONG li-shun
..............
page:101-102
Linux-based IPv6 bridge Firewall Technology
LIU Zhan-wen;ZHAO Yu-guo;WANG Ji-cheng;PAN Fei
..............
page:66-67,70
Research of Security Architecture in E-government G2B Working Mode
HANG Bo
..............
page:68-70
dang qian dian zi zheng wu xin xi zi yuan jian she de zhi du zhang ai fen xi
zheng ping
..............
page:71-72
Improvement of real time on civil aviation management system
QIU Shuang;LIU Dan
..............
page:72-74
Information Security Strategies of Smart Card System based on Campus Network
LI Jian;HE Zhi-bin
..............
page:75-77
Campus network bandwidth optimization and management of the practice
WANG Jun;FONG Hong-cai
..............
page:78-80
di yu hei ke gong ji zheng ban ruan jian de liang fang
chen zuo
..............
page:81
tong yi wei xie guan li (utm) ping tai xing neng ti sheng mi jue
fei zong lian
..............
page:82-83
tu po web an quan fang yu jiang ju ,ips yi jun tu qi jian cheng zhu liu
qi ming xing chen gong si
..............
page:84-85