Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2012 Issue 5
Application of ECC Algorithm in SET Protocol
LIU Lei
..............
page:13-17
The Security Analysis of the Internet of Things
ZHANG Yan-xue;SONG zeng-guo
..............
page:67-70
Design of Network Audit System based on NDIS Driver
HE Bao-feng;ZHANG Yan-fang
..............
page:37-38,42
Analysis and Design on E-banking Management Information System Security
LIU Hong
..............
page:64-66
The Effective Method of Supervision and Management to Network Public Opinion in Colleges
WANG Wei-lin;DING Le-cheng;CHENG Li-Ping
..............
page:77-79
cpk(v7.0) kang liang zi ji suan gong ji de dui ce ji shi xian
..............
page:5-7
Windows Bootkit Implementation and its Detection System Design
YANG Xi-kai
..............
page:51-54
hui pu tui zhi neng feng xian guan li ping tai , ti gong qi ye an quan dong cha li
..............
page:93-94
he fei bai da ji tuan ling shou ye wang luo an quan cheng gong an li
..............
page:95-96
cpk zu he gong yue ti zhi (v7.0)
..............
page:2-4,7
Research of Trust Management about User Behavioral Model based on Association Rules for Cloud Computing
CHEN Xiu-zhi
..............
page:47-50
ni gai xuan ze shi me yang de shu ju ku an quan shen ji chan pin
..............
page:86-89
The FreeBSD Mandatory Access Control Profile
XU Mei-xia
..............
page:39-42
Self Evaluation System Research and Application
QIU Lan;NING Jian-chuang;LIANG Ye-yu;LU Song;TAN Bin
..............
page:22-27
xin xi an quan ying lai hong wu yue
..............
page:1
Analysis of Security and Technological Protection in WLAN
XU Chun-qiao
..............
page:74-76
The Introduction and Futurity of Intrusion Detection Systems
RONG Er-hu
..............
page:71-73
File Access Control based on Role and Transparent Encryption and Decryption Technology
WANG Quan-min;SHENG Tao;XU Shu-wei;HU Da-hai
..............
page:28-31,36
On the Copyright Protection of Digital Image Watermarking Technology Research
GAO Jian-hua
..............
page:43-46
yi an quan cao zuo xi tong wei yi tuo gou jian ke xin yun ji suan huan jing jiao tu ke ji fa bu jhse an quan yun jie jue fang an
..............
page:90-91
Internet-based Shared Disaster Recovery Center
Wu Xiao-yong;Li Hui-na
..............
page:60-63
hei ke lie chuan
..............
page:98
Based on the Virus Intrusion Detctiom Immune the Ory Research
ZHENG Ying
..............
page:32-36
xin xi dong tai
..............
page:96,99
Virtual Network and the Safety of the Experimental Teaching and Research
CHEN Rui-zhi
..............
page:80-85
sai men tie ke fa bu di shi qi qi hu lian wang an quan wei xie bao gao
..............
page:97
check point: da zao xie tong shi wang luo , gou jian zheng he an quan lan tu
..............
page:92,94
Baaed on the Cloud Concept of Military Logistics Information System Construction
YUAN Fang
..............
page:18-21
Bank Data Center Disaster Recovery Design
TIAN Xia-li;XIONG Ying
..............
page:55-59
Study of Intrusion Detecton Mondels for Web Applications
ZHOU Yong-lu;WU Hai-yan;JIANG Dong-xing
..............
page:8-12