Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2006 Issue 4
Gray-level Image Watermarking Algorithm Based on a Visual Model Using DWT
Ma Yide;Zhang Zaifeng;Wang Tao;Feng Xiaolan
..............
page:81-84
Study of a Dual Encryption Technique Based on RSA in Software Registration
Yan Lelin;Cai Pingsheng;Liang Chen
..............
page:79-80,74
Our Country Electronics Governmental Affairs Information Safety and Guarantee System
Wang Qian;Chen Fang
..............
page:75-78,65
Study of Testing System Security Based on Web
Xian Qiang
..............
page:72-74
Branch Intelligent Management System
Wang Haisheng;Wu Bo;Li Weichao
..............
page:69-71
Methods On The Transitive Closure Of Binary Relation
Yang Meiyan
..............
page:48-49,84
The Procedure Debugs Errors While Running and Detective Method
Zhao Jinguo;Luo Qingyun
..............
page:46-47
Application of PVLAN Technology on District Broadband Networks
Chen Guangping;Huang Jun
..............
page:43-45
The Analysis of The Development About Info-network Opposed System
Zhang Yongzhong;Pan Qiang;Zhang Jun
..............
page:41-42,40
Dissecting and Researching of Packet Capture Mechanism Libpcap
Yan Lili;Tu Tianlu;Zhou Xingtao
..............
page:38-40
The Research on the Analysis of DDoS Attack Technology and the Countermeasures
Chen Lin;Liu Bencang
..............
page:35-37
Research and Analysis of Honeypot Technology
Zai Jiqiang;Ye Fei
..............
page:15-17
The Lenove of Thought Serves to Cooperate with CompTIA, Technique Attestation Internationalization
Xiao Hui
..............
page:2
When the Internet is Not the Tool of the Western "Peaceful Evolution" any More
Zuo Xiaodong
..............
page:8-10
Rongji Thousand Trillion Networks Threatens to Scan the System the Pre-eminent Showing Up
Xie Jing
..............
page:11
The Biggest Data in Our Country Recovers the National Catena Organization Uncovers the Veil of Mystery
Li Ming
..............
page:12
Safe Realm in Network in Military Advance in Technology in Aotu
..............
page:13
The EMC keeps the Saving Solution in Lets Saving More Simple Technology & Application
..............
page:14
Windows Server 2003 Security and Protection
Miao Junmin;Wei Jianhang;Wang Dongfang
..............
page:85-87
Research in Wireless Sensor Network Topology Optimization
Ma Bin;Zhou Xiaojia
..............
page:88-90,10
Secure Authentication and Registration Protocol in Mobile IP with AAA
Liu Dongsu;Wang Xinmei
..............
page:91-92
According to the IBR Realizes VLAN Correspondence Application Study
Xiao Gexin;Jiang Tao
..............
page:93-94
News
..............
page:95-96
SEE-CMM Application of Information System Security Architecture
Hu Shanquan;Wan Ansheng
..............
page:66-68
Design and Implementation of Security Mechanism for Digital Hospital based on Struts Framework
Yang Yanshuang;Xin Shuang;Yuan Xiaodong
..............
page:63-65
Design and Realization of Medical Multimedia on-line Test System
Lan Shunbi;Peng Jingjing
..............
page:60-62
Talk About Invading Ways and Defense Tactics of Computer Virus in Schoolyard Networks
Nie Junhang
..............
page:58-59
Research on Integration Frame with Enterprise Information Portals Technology
Sui Liping;Yang Rongzhou
..............
page:55-57
Teaching and Leaning Web Site Developing and Researching
Gao Jianhua
..............
page:53-54,33
The Design and Realization of Server's Information Monitoring And Analyzing System
Wang Yanqing;Zhi Feng
..............
page:50-52
Factors of Constituting Secure Strategy
Yang Can;Liu Zhongwei;Liang Fengli
..............
page:34,28
A Worm Intrusion Detection Based Network Abnormal Traffic
Song Anli;Tang Cheng;Wu Weishan
..............
page:31-33
Study on Security Safeguard System of Military Information Publishing System
Xiao Meng;Jin Weixin;Xie Yongqiang
..............
page:29-30
The realization of personal firewall with intrusion detection technology
Liang Zhirong
..............
page:26-28
Research on the Security Strategy of Distributed Database System
Wu Jiang;Li Taiyong;Wu Xiaozhi
..............
page:23-25
How To Realize the Information Security of eGorvernment
Yang Ying
..............
page:21-22
An Authorization and Access Control Model Based on PKI Analysis and Design
Dun Ze;Zhang Shujie
..............
page:18-20