Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2002 Issue 3
Computer virus
..............
page:63-63
Principles and application of proxy firewalls
Li Yi;Duan Yunsuo;Wang Zifang
..............
page:58-62
International information security laws establishment
Li Xianhua
..............
page:53-57
Advices for Win2000 security
Yang Jingbing
..............
page:51-52
Confronting worm virus and the analysis
Net Man
..............
page:48-50
Reasonable use of firewalls
Yi Peng
..............
page:46-47
Password recovery mechanisms for Websites
Ren Xiangmei
..............
page:43-45
Java Security properties and its use in electronic commerce
Chu Hongfeng
..............
page:38-42
DISCUSSION OF COMPUTER NETWORK SECURITY
Liu Shuang-ying;Chen Li-chao;MaRui
..............
page:34-37
Analysis of Mobile IP Security to Defeat DoS Attacks
Gao Ke;Xu Wenbo
..............
page:29-33
An Overview of Electronic Cash
Gao Huming;Zhang Fangguo;Wang Yumin
..............
page:25-28
Information and Network Security (2)
Han Yongfei
..............
page:22-24
On the strongpoints and shortcomings of PKI-CA in real-world applications
Zheng Hua;Hao Mengyi;Wang Guoqiang
..............
page:16-21
Understanding PKI
Jin Jiwu;Feng Denguo
..............
page:10-15
China information security: the present and the future
Yan Zhong
..............
page:6-9