Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2001 Issue 7
Safety Scanning Techniques
Tang liyong;Duan Yunsuo;Chen Zhong
..............
page:61-64
Issues of Infringement of Copyright Crime on Web
Zhu Tiejun;Wang Jing
..............
page:58-60
Research and Design of Common Security Platform
Liang Zhilong;Zhang Zhihao
..............
page:31-33
Internet Key Exchange Protocol and Analysis of Security
Wang Huifang;Guo Zhong;Huang Yongzhong;Guo Jingeng
..............
page:27-30
Structure Analysis of Public Key Cryptography Standards ( PKCS 12)
Hong Jingxin;Tang Jiandong;Chen Huihuang
..............
page:23-26
Information hiding and Watermarking Techniques on Web
Chen Qi;Wang Bingxi
..............
page:19-22
Investigation of Cyber-Crime and Evidence Obtaining
Wang Xiaobin
..............
page:15-18
Eveluation of French Certification Authority System
Ma Minhu;Xu Sujia;Huang Ruihua
..............
page:12-14
PKI to be disscussed
Nan Xianghao;Chen Zhong
..............
page:6-11
New Questions Emerging from Electronized and Networked Finance--From View of Identification and Punishment of Property Crim
Ruan Qilin
..............
page:54-57
E-commerce Security and Data Message Protection under Criminal Law
Yang Zhongmin;Pan Xuejun
..............
page:50-53
Dialectic Analysis of" Hacker" Behavioral Value--A Discussion With Beneficial" Hacker"
Yu Zhigang
..............
page:47-49
On the Harm and Social Control of Hackers
Liu Qiang
..............
page:44-46
Sniffering and Its Prevention
Zhuang Chunxing;Peng Qizhi
..............
page:41-43
Hacker and Its Major Attacking Measures
Fu Yumin
..............
page:39-40
Constructing the Protection System for Industrial Information Security
Cao Bin
..............
page:37-38
The Implementation of RSA Public Key Algorithm and RSA Signature Algorithm
Gu Tingting;Li Tao;Yin Peng;Wang Wurong;Wang Xianwang;Leng Liqin;Wang Yao
..............
page:34-36