Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2010 Issue 10
Analysis and Design of Security Model for Information System
FU Sha
..............
page:51-53
Combined Public Key(CPK)Cryptosystem Standard(v5.0)
..............
page:1-2,5
Certificateless Multi-proxy Blind Multi-signature Scheme
YANG Chang-hai;XU Xiao-hong
..............
page:6-8
Analysis of Advanced Malware Bypassing Techniques
He Zhaohui
..............
page:93-97
Centralized Firewall Control Application in the Data Center
HUANG Da-wen
..............
page:70-72
The Research on Campus Network Topology Discovery
JIN Hong-ying;WANG Chao-bin;LIAO Ying-mei
..............
page:43-44
jie pu fang huo qiang zai gao xiao wang luo zhong de ying yong
zhang yong
..............
page:87-88
check point tui ying yong kong zhi ruan jian dao pian guan kong shu qian zhong web2.0 ying yong
..............
page:85
2010 nian ji wei lai wang luo an quan de si da qu shi
..............
page:80-82
Digital signatures based on public key cryptography
ZHANG Wen-li
..............
page:49-50
Application of Data Mining in Intrusion Detection System
HUANG Ning;LI Yu-long;SHAN Yong-fei;ZHOU Qiang
..............
page:40-42
Application and Research of Endpoint Protection in Enterprise Network Administration
YANG Qing-ming;DU Bao-dong
..............
page:77-79
Study of Application Security for Web Services Technology
HU Shi-qiang
..............
page:35-37
A Study on the VPN-Solution to Logistics System
XU Hai-Zhu
..............
page:22-23,34
Civil Aviation Meteorological Center of Northwest Construction of Network Security System
CHEN Qi-ya;XU Cai-de
..............
page:73-76
PKI-based Authentication Identification Technology
CUI Fu-yun;FAN Hai-tao;ZHANG Ning
..............
page:45-48
ji yu ke xin ji suan de ying yong cheng xu bai ming dan guan li xi tong
meng ling qiang ; guan yong ; zhang xiang hong ; gong li jun ; guo hao bo
..............
page:16-17,21
xie teng xun yi ling zhu hou
..............
page:102
Application Research of IT Audit
YANG Jie
..............
page:18-21
xin xi dong tai
..............
page:30,48,58,76,82,86,90-92,103
Analysis of Common Attack Techniques for Wireless LAN
CHEN Chao;JIN Hui-yun
..............
page:54-56
Research of Secure Hash Algorithm SHA-1
ZHANG Song-min;TAO Rong;YU Guo-hua
..............
page:3-5
lang chao ying xin an quan fu wu qi jie xi xin pian ji wang luo shu ju shen du guo lv pian
..............
page:89
A Visualized Early Detection Technique Against Network Worms
HOU Feng-han
..............
page:98-99
A Three Resolution for Obstacle Detection Using Stereovision
ZHANG Jia-Xuan;WANG Cheng-ru
..............
page:9-12
Based on the Analysis of Active Defense Technology Research
YAN Xin-juan;TAN Min-sheng;LV Ming-e
..............
page:38-39
an quan ri zhi tong yi shou ji ping tai de shu ju jia gou she ji yu shi xian
zhu hong
..............
page:27-30
an quan jian kong yu jing ping tai de he xin ti xi mo xing she ji
zhou peng ; hu rong
..............
page:31-34
Research of Application of UTM in Vocational Education Netwroks
WU Gang-shan;GAO Wei-jiang;GUO Dong-hua
..............
page:68-69
Design of Remote Trusted Upgrade for Embedded Terminal
SHI Jun-fang;LI Xiao-jiang;MEI Luan-fang;CHEN Juan
..............
page:13-15
Construction of Network Log Management System based on Domestic-made OS
LI Jin-chuan;QIAN Xiu-bin;FANG Xin
..............
page:59-61
dong ruan gou jian an quan fu wu xin jia gou bao zhang yong hu xin xi an quan
..............
page:83-84
Research on Emergency System and Technology of Secondary Power System
SU Yang;CHEN Jia-tong
..............
page:62-64,67
Access Control of Logistics System with Improved RBAC
LI Wei
..............
page:24-26
jian li ru wang an quan yan shou zhi du de si kao
he qiu ping ; qiu zuo ; tan bin ; liang ye yu ; ning jian chuang
..............
page:65-67
The Threat and Guard Against of the Phishing of Attacking
YU An-sheng;JIN Tie;YANG Tao
..............
page:100-101
Research on the Data Safety Management of C41 System
YE Qing-wei;XU Ying-ming;LI Shao-jie
..............
page:57-58