Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2008 Issue 9
zi zhu chuang xin da zao zhong duan an quan
duan hong
..............page:105
fu wu qi ke yi lian jie jian ce xi tong
bai zuo
..............page:106-109
huan you ren shou hai yu wang luo diao yu qi zha ma ?
Phillip Hallam-Baker
..............page:102-103
utm jiu jing shi shi me ?
chen sheng quan
..............page:101
Application of MD5 Algorithm in Office Automation System
ZHANG Zhi-fa
..............page:97-100
guan yu xiao yuan wang an quan guan li de yan jiu
li zhen shan
..............page:93-96
Cases on Information Safety Problems in Enterprise & Relative Strategies
SUN Ke-quan;ZHANG Zhi-zheng
..............page:88-92,96
A Security System Design of Digital Signature Based on PKI
HUANG Guan-li;HU Yi
..............page:78-80
Dynamic Control of the Database Inference Channel
CUI Chun-ying;QIAO Rui
..............page:50-53
Application of Chaos Theory in Cryptography
HE Xiao-yu
..............page:30-32,36
A Policy of the Access Control in the Information System
REN Kui;WANG Pu;LI Ya-fen
..............page:41-44
Analysis and Design for Security of Web Applicagtion System
PENG Yu-zhong;WANG Jin-cai;HAO Eong-xia
..............page:45-47
Local internet failure eliminate and diagnosis
LIANG Jun-li
..............page:120-122
an quan zi xun
..............page:123-125
bie liao , fan qie hua yuan
qu ding
..............page:126-127
yan lun
..............page:128
xin xi
..............page:21,44,57,70,113
wang ye fang cuan gai ji shu
yang fei
..............page:76-77
ji yu ren wu he jiao se de fang wen kong zhi mo xing yan jiu
zhang qing ping
..............page:74-75,84
xian dai rong zai xi tong ji ji shu
liu wen
..............page:71-73
Research on Intrusion Prevention System
LI Li-hui
..............page:68-70
Secure Analysis and Improving on the PGP E-Mail System
BAI Yong-xiang
..............page:61-64
Worm Detect in Basic of OSSIM's Correlatoin Analysis Technic
ZHANG Ping;SHAN Lan
..............page:58-60
The Research of Index Mechanism in Embedded Database
HUANG Jia-xi;CHEN Tian-huang;ZHENG Sheng-ying
..............page:54-57
zu he gong yue (cpk) ti zhi biao zhun v2.1
nan xiang hao ; chen hua ping
..............page:1-2
Study on Anti-Phishing Based on Trusted Computing Technology
WANG Yu-lei;HUANG Zhao-he;ZHANG Chong
..............page:3-6
Security Risk Analysis and Protection Policy for Peer to Peer Networks
WANG Jian;YANG Yi-xian;ZHANG Dao-sheng
..............page:7-11
Deep Knowledge Based Fault Emergency System Model
WANG Jin-juan;LIU Sheng-nan
..............page:15-18
A Adaptive Blind Watermarking Algorithm Based on Wavelet Transform
ZHAO Yan-tao;SU Feng-yan;LI Zhi-quan
..............page:26-29