Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2008 Issue 6
An improved tamper detection algorithm Based on DWT
LI Chun-juan
..............page:30-32
Application on EAM System Integration Based on SOA
ZHAO Shuang;YANG Jian-feng;LIU Wen-bin
..............page:33-37
Design and Implementation of Net Proxy Server
Che Kui;Xing Shu-tao
..............page:38-40
The Implementation of RSA Public-Key Algorithm in Visual C++
Shi Yingying;LI Tao
..............page:44-46
THE Research and Realization of the Attack Defense on the Web Application
YU Xiao-yi;CHANG Yan;XU Han-wei
..............page:47-51
Analyse to protective technology of XML Data Safty
SUN Run-gou
..............page:25-29
The countermeasure and analyses about security of storage technology
WU Hao;YU Jian-guo
..............page:21-24
A security hashing algorithm for Direct Anonymous Attestation Scheme
MA Xiao;PANG Zi-long;LIU Jing-sen;LIU Ming-li
..............page:17-20
Analysis of AES's Implementation with FPGA
TANG Jin-yi
..............page:14-16,20
ji yu you hua bp shen jing wang luo de wsns lu you an quan ping gu mo xing
qing zuo ; zuo chao shu ; liu dan
..............page:11-13
Communication Efficient Model for DDoS Detection
DIAN Shi-mei
..............page:7-10
an quan zi xun
..............page:103-110
ke xin ji suan san qi kai
qu ding
..............page:111-112
sheng yin / shu zi
..............page:插1
The invasion and defense of spam
GAO Qian
..............page:52-53
A P2P network flow monitoring model based on SNMP
SHI Liang-WU;GU Ke;LI Hong-yan
..............page:54-56
Based on TCP sequence number forecast safe analysis and guard
XIAO Xi-gang
..............page:57-58,62
Research on Fuzzy Neural Networks applicating Deception Detection
Yang Dong;Lv Ming-e
..............page:59-62
juniper idp: bu shi wu li kan hua
chen dong yu
..............page:86
mei you te : you jian he an quan bing zhong
duan hong
..............page:88
jie pu gao xing neng utm xi tong
li jin ku ; ding chang fu
..............page:89-90
chan pin
..............page:94-96
fa lv zhuan jia dan you myspace hei ke liang xing
qian dui zhan
..............page:97
qi ye wang an quan guan li yu ce lue
liu chang ming
..............page:98-100
Disk Data Recovery by Modify MBR
DONG li-shun
..............page:101-102
Linux-based IPv6 bridge Firewall Technology
LIU Zhan-wen;ZHAO Yu-guo;WANG Ji-cheng;PAN Fei
..............page:66-67,70
Improvement of real time on civil aviation management system
QIU Shuang;LIU Dan
..............page:72-74
Campus network bandwidth optimization and management of the practice
WANG Jun;FONG Hong-cai
..............page:78-80
tu po web an quan fang yu jiang ju ,ips yi jun tu qi jian cheng zhu liu
qi ming xing chen gong si
..............page:84-85