Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2006 Issue 12
The Implement of E-business Security on Based of Public-Key Cryptosystem
Liu Minghua;Hu Qiang;Yang Mi
..............page:83-84
A Digital Watermarking Technology for Color Images
Wei Lanying;Zhang Yanbo;Zhang Peng
..............page:80-82
Identification and Evaluation of Police Informanization Risks
Shao Zufeng;Xu Zonghai
..............page:78-79,77
Computer Forensics Introduction
Tan Min;Hu Xiaolong;Yang Weiping
..............page:75-77
Application of the Star-shaped Tunnel and Ringed Tunnel in VPN
Wang Fang;He Honglei
..............page:70-71,39
Research of Web Services Based on Apahce Axis
Xiong Zhongzhe;Gao Shu;Li Linlin
..............page:49-51
Analysis of Network Attacks and Network Security
Liu Xiufeng;Fan Zhigang
..............page:46-48
Detection Efficiency Research on Intrusion Detection System
Wang Xingzhu
..............page:43-45
Safety Protection About Inbreaking of Trojan Horse
Xiao Jiangwen;Yi Yu
..............page:37-39
E Net Protection Founder Safety
Xiao Hui
..............page:10,19
Research and Design of Linux Firewall
Wu Shan;Wu Hai;Hu Wenguang
..............page:21-22,51
Template of PKI Certificate Authority Center Implementation Based On OpenSSL
Chen Jun;Duan Huiliang
..............page:23-25,34
Design and Implementation of the IPv6 Ftp Server Based on QuickServer
Liang Sheng;Zang Saogang;Fu Guangxuan
..............page:26-28,31
Attack Principle and Protection from ARP Virus
Song Xiaohui
..............page:29-31
Security Problems and Policies of IP Layer in TCP/IP Network
Liu Jiemin;Jing Maohua
..............page:32-34
Research on Single Pattern Matching Algorithm
Xu Li;Li Yichao;Liu Dan
..............page:85-87
Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity
He Wencai;Du Peng;Liu Peihe;Zhuang Yuanyuan;Niu Xiaolei
..............page:88-90,84
Technologies and the Vulnerabilities of Software Encryption
Liu Lei;Jing Jie
..............page:91-92,87
Research on Detection of WAPI and Secure Foundational Architecture
Zhao Yujuan;Zhang Haojun;Qin Xingqiao
..............page:93-94,82
The Analysis of the Network Information System Security Defense
Peng Xiufen;Xu Ning
..............page:52-54
A Design of Intrusion Detection Systems Based on P2P Network
Wang Kuifeng
..............page:55-56
A P2P E-business Model Based on The Traditional Trade Pattern
Xue Haiqing;Zhang Yougen
..............page:57-59
Restore a hacked Internet Explorer
Wang Hongwei
..............page:60-61
Security Management and Training In The Network Security System
Zheng Diying;Yang Dehua
..............page:64-66
The Research of the Information Security Risk Evaluation Method
Song Xiaoli;Wang Jinsong;Chen Yuan
..............page:67-69