Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2007 Issue 12
gao zhi yuan xiao xiao yuan wang jian she tan tao yu yan jiu
tao jia yin ; bai xiao ming
..............page:73-74
gong an dian zi zheng wu ying yong ceng an quan gui hua yan jiu
yang liu qing
..............page:75-76,85
xiao yuan xin xi hua yi ti hua wang luo an quan bao mi ti xi
chen xing yuan ; zhang bin ; yang zhi ; tao rong hua
..............page:77-78,59
ids yu ips de fen xi yu dui bi
cui jie
..............page:84-85
ji yu agent kua zu zhi gong zuo liu xi tong mo xing de yan jiu
jin dan ; dai wei ; wang xue hui
..............page:70-72
ji yu arcgis server de webgis xi tong kai fa
gao yong ; cai xian hua ; liu zuo ; xu jian xin
..............page:68-69,40
ji yu web fu wu de yi dong dian zi shang wu xi tong de yan jiu
wang zhe ; jia dong ning ; zhou li jiang
..............page:65-67
ji shi tong xin xi tong chuan yue nat ji shu fen xi
zhao xiao li
..............page:63-64,38
jun dui yuan xiao wang luo xin xi an quan feng xian ping gu yan jiu
chen peng ; cai ; lu hao
..............page:60-62
si ke fwsm fang huo qiang mo kuai yan jiu yu ying yong
yang li bo ; zhu xun
..............page:55-56
wo jun wang luo hua jian she an quan fang fan ti xi de yan jiu he dui ce
yu wen fang ; long ming yuan ; mi hai bo
..............page:53-54,42
ji yu zhi neng ka de an quan fen xi yu she ji
he wen cai ; ji xing yuan ; wang jiu lin ; wang zhong hua ; zhu wen jie
..............page:50-52
shen ji xin xi hua xi tong zhong de rbac yu weblogic1
he lei ; ding han ji ; ruan shu zuo
..............page:48-49,52
wang luo jie ru kong zhi zai hai guan wang luo an quan guan li zhong de ying yong
ji xiao fei ; du peng chao ; lu zuo ; yu wei rong
..............page:45-47,67
xiao yuan wang web fu wu qi de an quan pei zhi
zhou ya feng ; gao zhong he
..............page:43-44,74
dian zi you jian an quan wen ti fen xi yu dui ce
feng yu fen ; ying feng
..............page:41-42
ji yu xi jie dian ju lei de zhi wen pi pei suan fa
li hai yan
..............page:39-40
shu ju an quan fang cuan gai jie jue fang an yan jiu
cui juan
..............page:33-35,83
wang luo ru qin bao hu xi tong de yan jiu yu shi xian
yu jing miao
..............page:31-32,18
secure computing hu hang zhong yuan ji yun
li di
..............page:11
wu xian ju yu wang an quan xing jie xi
dong zheng ming ; shi jin
..............page:15-16
ru qin jian ce ji shu tan tao
fang wen ping
..............page:21-22
qian xi wang luo an quan yu ru qin jian ce xi tong
yao yu xian
..............page:23-25
p2p wang luo fang wen kong zhi yan jiu
wang yan hua ; zhou zuo
..............page:26-27,25
linux xia netfilter/iptables fang huo qiang de yan jiu yu shi xian
zhou zuo ; gao zhong he
..............page:28-30
yi zhong dan mo shi pi pei suan fa
wang xiu juan ; yi zheng qiang
..............page:86-87
yi zhong elgamal ti zhi de mang qian ming fang an
han chun xia ; wang lin jie
..............page:88-89
ji yu tu xiang zhi luan de shu zi shui yin suan fa
gao xing ming ; cai xiang yun
..............page:92-93
wen jian shu zi qian ming xi tong zai ju yu wang zhong de ying yong
ying feng ; feng yu fen
..............page:94-95
xin wen ji zuo
..............page:96