Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2002 Issue 3
Computer virus
..............page:63-63
Principles and application of proxy firewalls
Li Yi;Duan Yunsuo;Wang Zifang
..............page:58-62
International information security laws establishment
Li Xianhua
..............page:53-57
Advices for Win2000 security
Yang Jingbing
..............page:51-52
Confronting worm virus and the analysis
Net Man
..............page:48-50
Reasonable use of firewalls
Yi Peng
..............page:46-47
Password recovery mechanisms for Websites
Ren Xiangmei
..............page:43-45
Java Security properties and its use in electronic commerce
Chu Hongfeng
..............page:38-42
DISCUSSION OF COMPUTER NETWORK SECURITY
Liu Shuang-ying;Chen Li-chao;MaRui
..............page:34-37
Analysis of Mobile IP Security to Defeat DoS Attacks
Gao Ke;Xu Wenbo
..............page:29-33
An Overview of Electronic Cash
Gao Huming;Zhang Fangguo;Wang Yumin
..............page:25-28
Information and Network Security (2)
Han Yongfei
..............page:22-24
On the strongpoints and shortcomings of PKI-CA in real-world applications
Zheng Hua;Hao Mengyi;Wang Guoqiang
..............page:16-21
Understanding PKI
Jin Jiwu;Feng Denguo
..............page:10-15