Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2007 Issue 6
Researching on Traceback of DOS Attackers for IPv6
Cui Xuepeng;Wang Wenguo
..............page:17-18,29
Linux Kernel Firewall and its Implement
Zhou Xiaomei
..............page:19-21
Electronic Stamp Promoting Paperless Office
Cao Zhenzhong
..............page:22-23
The Discussion About the LAN Security and Defence
Zhong Jiaming
..............page:27-29
The DAWNING Establishes the Xiangtan University High
wang xin ying
..............page:13
The Applied Safety in Network is in Advance
Li Ming
..............page:12,95
Research and Implementation of SNMP Based Network Management System
Li Xiongwei;Sun Dayue;Ma Xiao;Qian Dingjun
..............page:41-44
Research on Technology Based on Anomaly Intrusion Detection
Ye Fei;Shi Fubin
..............page:45-47,44
Studying and Implementing the authorization of call system in E-gov
Gu Xiaoqing;Xu Shengwei;Fang Yong
..............page:48-50
Personal Computer Security And Virus-Prevention
Qin Libo
..............page:51-53
The Research on the Security of Network for Police Office Intranet
Li Hanqing;Lu Gang;Hou Zhiyong
..............page:54-55,70
Identity-Based Encryption and the Application in E-business
Liu Hongwei
..............page:59-60,50
Selection of Materialized ViewsUnder Cost Constraints Based on Genetic Algorithm
Liu Jie;Jiang Chaohui;Dang Jisheng
..............page:61-62,73
SOC: an Enterprise Information Security Manager
Zhao Xianjun;Cai Li
..............page:63-64
The Studies of The Risks And Countermeasures In Internet-Bank Business
Zhan Dexin;Gong Lin;Yang Bitian
..............page:68-70
The Analysis of the Firewall in the Campus Network
Deng Yongjun;Ren Aifeng;Chen Guohua
..............page:71-73
An Authentication System with Good Performance Based on Forms
Ding Wei;Huang Benxiong
..............page:74-76
Design and Implementation of WEB800 Service Based on Parlay
Jiang Xiangdong;Ren Li
..............page:77-79
Research on Applications for CORAS Model-based Information Security Risk Assessment
Liu Haifeng;Guo Yixi;Xiao Gang
..............page:80-82
A Study on Application of ECDSA in the Security of Mobile E-commerce
Wang Yaobin;Li Haifeng;Zuo Weiping
..............page:83-85
Trend of PhiShing and Law Strategy
Ren Chuanlun;Yang Yixian;Feng Zhaohui
..............page:86-87,35
Research and Simple Implementation of RSA Algorithm
Li Qing;Li Xiongwei;Jin Tao
..............page:88-91
Based on Goldbach's Conjecture Asymmetrical Encryption Algorithm
Xing Ziya;Liu Zhenxiang;Liu Yuan
..............page:92-93
The Dynamic Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
Zhu Qingfang;Wang Tianqin
..............page:94-95
News
..............page:96