Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2010 Issue 10
Research on Security of Quantum Cryptography in Wireless LAn
Han Fang;Wang Xuechun
..............
page:70-72
Discussion about the website safety and answers tactics
Liu Lei;Chen Yi
..............
page:26-28
Network Infrastructure Upgrading Of Nanyang Power Supply Company
Liu Yannan;Lu Xian
..............
page:46-49
Analysis of New information Security Problems in the Internet of Things Times
Zhu Zhexue;Wu Yunan
..............
page:12-14
An Identity-Based Signcryption Scheme with Public Verifiability
Wen Yiling;Ma Jianfeng
..............
page:6-8
Briefly discussed the diagnosis and processing of the common failure of the computer network
Wang Haifei
..............
page:9-11
Discussion on Information Security under the Cloud Computing Environment
Zhang Yahong;Zheng Lihua;Zou Guoxia
..............
page:76-77
Public housing management in Hangu District,Tianin
Li Wei
..............
page:42-43
Design of Digital Video Surveillance Network System Based on IP
Liu Tao;Wu Jin
..............
page:53-55
Brief analysis of switchboard function and work level
Lu Qiuju
..............
page:50-52
Design of Distance Learning Authentication System
Yang Guang
..............
page:37-38
Higher vocational college Student achievement management problems and some solutions
Ren Xiaolong
..............
page:78-80
The Analysis on Prevention technology to the Trojan horse
Yang Enzhen;Xiang Laisheng
..............
page:29-31,28
Network Security Evalustion Base ON Fuzzy Multi-factorial Evaluation
Yang Wujun
..............
page:20-22
An Enhanced Intrusion Detection Method based on GCA
Fu Shuangsheng;Zhang Mingjun;Liu Dihua;Lu Xiaofan
..............
page:73-75
Computer network information security research
Ou Xianyong
..............
page:64-67
Design and implementation of J2EE based handphone cargo information platform
Wang Jikui
..............
page:56-57
Research and Design of Campus-Based Network Security System
An Dezhi
..............
page:23-25
The Common Network Behavior Analysis and Research of the Campus Network
Zhao Ruigang;Huang Jialin
..............
page:34-36
wei shi tong " an quan cun chu xi tong ji ying yong jie jue fang an " zai jing fa bu
..............
page:5
Design of traceability system for the agricultural product based on RFID and Two-Dimensional Code technology
Bian Jirong;Song Liya
..............
page:39-41
Technology analysis of security problem of IOT
Ye Qing
..............
page:32-33
Mobile IPv6 Protocol Security research
Wang Tianming;Li Lirong
..............
page:17-19
Build Computer Network Experimental Environment With the Use of Virtual Machine Technology
Liu Kun
..............
page:68-69,75
Improved fire objective segmentation method based on video
Zhou Lei;Liu Zhengxi
..............
page:61-63
Information Network System Survivability Evaluation Based on Fuzzy Comprehensive Evaluation
Wang Zhigang;Yang Shisong
..............
page:58-60
hua wei sai men tie ke gou jian utm+ tong yi an quan jie jue fang an
..............
page:4
wu da guan jian ci ju jiao 2010 ling hu lian wang da hui
..............
page:封2,1
Design and Implementation of Remote Monitoring System Based on GPRS
Chen Xin;Liu Zhongxuan;Han Zhaofu
..............
page:44-45,67
Research on ARP Spoofing Attack of Campus Network and Prevention
Qin Yong;Zhang Haifeng
..............
page:15-16