Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2010 Issue 10
Certificateless Multi-proxy Blind Multi-signature Scheme
YANG Chang-hai;XU Xiao-hong
..............page:6-8
Analysis of Advanced Malware Bypassing Techniques
He Zhaohui
..............page:93-97
Centralized Firewall Control Application in the Data Center
HUANG Da-wen
..............page:70-72
The Research on Campus Network Topology Discovery
JIN Hong-ying;WANG Chao-bin;LIAO Ying-mei
..............page:43-44
Digital signatures based on public key cryptography
ZHANG Wen-li
..............page:49-50
Application of Data Mining in Intrusion Detection System
HUANG Ning;LI Yu-long;SHAN Yong-fei;ZHOU Qiang
..............page:40-42
Study of Application Security for Web Services Technology
HU Shi-qiang
..............page:35-37
A Study on the VPN-Solution to Logistics System
XU Hai-Zhu
..............page:22-23,34
PKI-based Authentication Identification Technology
CUI Fu-yun;FAN Hai-tao;ZHANG Ning
..............page:45-48
ji yu ke xin ji suan de ying yong cheng xu bai ming dan guan li xi tong
meng ling qiang ; guan yong ; zhang xiang hong ; gong li jun ; guo hao bo
..............page:16-17,21
xie teng xun yi ling zhu hou
..............page:102
Application Research of IT Audit
YANG Jie
..............page:18-21
xin xi dong tai
..............page:30,48,58,76,82,86,90-92,103
Analysis of Common Attack Techniques for Wireless LAN
CHEN Chao;JIN Hui-yun
..............page:54-56
Research of Secure Hash Algorithm SHA-1
ZHANG Song-min;TAO Rong;YU Guo-hua
..............page:3-5
A Visualized Early Detection Technique Against Network Worms
HOU Feng-han
..............page:98-99
A Three Resolution for Obstacle Detection Using Stereovision
ZHANG Jia-Xuan;WANG Cheng-ru
..............page:9-12
Based on the Analysis of Active Defense Technology Research
YAN Xin-juan;TAN Min-sheng;LV Ming-e
..............page:38-39
an quan jian kong yu jing ping tai de he xin ti xi mo xing she ji
zhou peng ; hu rong
..............page:31-34
Research of Application of UTM in Vocational Education Netwroks
WU Gang-shan;GAO Wei-jiang;GUO Dong-hua
..............page:68-69
Design of Remote Trusted Upgrade for Embedded Terminal
SHI Jun-fang;LI Xiao-jiang;MEI Luan-fang;CHEN Juan
..............page:13-15
Construction of Network Log Management System based on Domestic-made OS
LI Jin-chuan;QIAN Xiu-bin;FANG Xin
..............page:59-61
Research on Emergency System and Technology of Secondary Power System
SU Yang;CHEN Jia-tong
..............page:62-64,67
jian li ru wang an quan yan shou zhi du de si kao
he qiu ping ; qiu zuo ; tan bin ; liang ye yu ; ning jian chuang
..............page:65-67
The Threat and Guard Against of the Phishing of Attacking
YU An-sheng;JIN Tie;YANG Tao
..............page:100-101
Research on the Data Safety Management of C41 System
YE Qing-wei;XU Ying-ming;LI Shao-jie
..............page:57-58