Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2007 Issue 6
Take the Seat to the Number-Safe "Cost Rule" in Net Inside the LanSecS
Mang Gang
..............
page:15
Performance Calculator Machine a System Wang Xinying Aodun Fire Wall KFW-1500
Li Jun
..............
page:14
The UTM Enters "Turn in Brief" the Ages USG Toes Set Up to Get to Run the Market
Liu Kun
..............
page:16
Researching on Traceback of DOS Attackers for IPv6
Cui Xuepeng;Wang Wenguo
..............
page:17-18,29
Linux Kernel Firewall and its Implement
Zhou Xiaomei
..............
page:19-21
Electronic Stamp Promoting Paperless Office
Cao Zhenzhong
..............
page:22-23
According to the Understanding and the Improvement Technique of the Kerberos Network Attestation
Hao Wenjiang;Yang Yongchuan
..............
page:24-26
The Discussion About the LAN Security and Defence
Zhong Jiaming
..............
page:27-29
Cover the Clandestine and Technical Research With Realizes
Ma Ding
..............
page:36-37
LDAP-Bbased Unified Identity Authentication System Research
Xu Yan
..............
page:38-40
The DAWNING Establishes the Xiangtan University High
wang xin ying
..............
page:13
The Applied Safety in Network is in Advance
Li Ming
..............
page:12,95
Trendmicro' IGSA Gets Stripe the Safe Protection in Long Range in Organization in Branch in Help Completely
Jing Rui
..............
page:11
To the Safe Product in Information Ratings Usage Policy Theories Investigative What Time Cognition
Fan Hong
..............
page:9-10
The CFCA Establishes with Each Commercial Bank" Net Silver Anti Cheat in Association with Act the Mechanism"
Xiao Hui
..............
page:8
Secure Computing Company the World Deputy Governor Comes to China to Investigate the Research
Xie Jing
..............
page:3
The TREND MICRO Announces the Safe Expert in Network the Service(TMES)
Xiao Hui
..............
page:2
Analyze WLAN and Safe Problem in the Network of WLANs
Liu Jie
..............
page:30-32
Safe Legal System of Information Network of Our Country Currently in Effect Defect and Perfect
He Caiying
..............
page:33-35
Research and Implementation of SNMP Based Network Management System
Li Xiongwei;Sun Dayue;Ma Xiao;Qian Dingjun
..............
page:41-44
Research on Technology Based on Anomaly Intrusion Detection
Ye Fei;Shi Fubin
..............
page:45-47,44
Studying and Implementing the authorization of call system in E-gov
Gu Xiaoqing;Xu Shengwei;Fang Yong
..............
page:48-50
Personal Computer Security And Virus-Prevention
Qin Libo
..............
page:51-53
The Research on the Security of Network for Police Office Intranet
Li Hanqing;Lu Gang;Hou Zhiyong
..............
page:54-55,70
Antivirus Measures Taken by Campus Nets Based on Seven-grade Defensive Security Mode
Chu Jianli;Ma Xuesong
..............
page:56-58,53
Identity-Based Encryption and the Application in E-business
Liu Hongwei
..............
page:59-60,50
Selection of Materialized ViewsUnder Cost Constraints Based on Genetic Algorithm
Liu Jie;Jiang Chaohui;Dang Jisheng
..............
page:61-62,73
SOC: an Enterprise Information Security Manager
Zhao Xianjun;Cai Li
..............
page:63-64
Research on the Technique of Sofware Safe Release & Transparent Registration
Liao Yonghong;Li Luo
..............
page:65-67
The Studies of The Risks And Countermeasures In Internet-Bank Business
Zhan Dexin;Gong Lin;Yang Bitian
..............
page:68-70
The Analysis of the Firewall in the Campus Network
Deng Yongjun;Ren Aifeng;Chen Guohua
..............
page:71-73
An Authentication System with Good Performance Based on Forms
Ding Wei;Huang Benxiong
..............
page:74-76
Design and Implementation of WEB800 Service Based on Parlay
Jiang Xiangdong;Ren Li
..............
page:77-79
Research on Applications for CORAS Model-based Information Security Risk Assessment
Liu Haifeng;Guo Yixi;Xiao Gang
..............
page:80-82
A Study on Application of ECDSA in the Security of Mobile E-commerce
Wang Yaobin;Li Haifeng;Zuo Weiping
..............
page:83-85
Trend of PhiShing and Law Strategy
Ren Chuanlun;Yang Yixian;Feng Zhaohui
..............
page:86-87,35
Research and Simple Implementation of RSA Algorithm
Li Qing;Li Xiongwei;Jin Tao
..............
page:88-91
Based on Goldbach's Conjecture Asymmetrical Encryption Algorithm
Xing Ziya;Liu Zhenxiang;Liu Yuan
..............
page:92-93
The Dynamic Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
Zhu Qingfang;Wang Tianqin
..............
page:94-95
News
..............
page:96