Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2012 Issue 5
Application of ECC Algorithm in SET Protocol
LIU Lei
..............page:13-17
The Security Analysis of the Internet of Things
ZHANG Yan-xue;SONG zeng-guo
..............page:67-70
Design of Network Audit System based on NDIS Driver
HE Bao-feng;ZHANG Yan-fang
..............page:37-38,42
The Effective Method of Supervision and Management to Network Public Opinion in Colleges
WANG Wei-lin;DING Le-cheng;CHENG Li-Ping
..............page:77-79
cpk zu he gong yue ti zhi (v7.0)
..............page:2-4,7
The FreeBSD Mandatory Access Control Profile
XU Mei-xia
..............page:39-42
Self Evaluation System Research and Application
QIU Lan;NING Jian-chuang;LIANG Ye-yu;LU Song;TAN Bin
..............page:22-27
Analysis of Security and Technological Protection in WLAN
XU Chun-qiao
..............page:74-76
File Access Control based on Role and Transparent Encryption and Decryption Technology
WANG Quan-min;SHENG Tao;XU Shu-wei;HU Da-hai
..............page:28-31,36
Internet-based Shared Disaster Recovery Center
Wu Xiao-yong;Li Hui-na
..............page:60-63
hei ke lie chuan
..............page:98
xin xi dong tai
..............page:96,99
Bank Data Center Disaster Recovery Design
TIAN Xia-li;XIONG Ying
..............page:55-59
Study of Intrusion Detecton Mondels for Web Applications
ZHOU Yong-lu;WU Hai-yan;JIANG Dong-xing
..............page:8-12