Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2010 Issue 5
The Design and Realization of Clustering Algorithm Based on LACHS
Yang Yueting;Chen Xin;Niu Chunping
..............
page:82-84
Buffer overflow security risks
Sun Wenhao
..............
page:9-10
Array SSL VPN to protect the safety of Panyu Cable office network running
Ye Min;Zhou Xiaomei;Zhong Xun
..............
page:71-72,61
Private Network Sharing Information on Public Network
Peng Xiaoli;Deng Xiaoqing
..............
page:39-40
The Appliance of VLSM Technology into the Management of IP Addresses
Wang Ning
..............
page:41-42
The research of Workflow System of PDM System Component-Based EJB
Feng Chuanxin;Gao Maoting
..............
page:53-55
Container Throughput Forecasting Based on ExponentialSmoothing Method
Cheng Xueping;Lin Guolong
..............
page:59-61
Research Of Key Pre-distribution Scheme For Wireless Sensor Networks
Yu Wangke;Ma Wenping
..............
page:19-21
Methods of attack on DNS based on Internet and Corresponding detection Measures&Precaution
Dong Xinke;Yuan Ping
..............
page:11-13
A Secret Sharing Scheme Based on The Trapdoor One-Way Function
Huang Kehua
..............
page:25-27
Research On Mobile Office Automatic Network and its Security
Yao Chunhui;Xie Haitao;Zhu Jiming;Xiao Jingchuan
..............
page:22-24
On the classified computer network security protection measures
Zhao Ruixia
..............
page:34-35
The Research of Techniques for Dual-hosts Hot Standby in a Satellite Navigation System
Liu Xiaoping;Liu Li;Cao Jidong;Hu Xianghua;Huang Shuanglin;Hu Guangming
..............
page:91-93
xin xi dong tai
..............
page:封2,1
Network management in shipping companies
Xi Erchen
..............
page:48-50
Study of Security Policy Based on P2RD Model in Office System
Tan Qiongling
..............
page:43-44
Communication network technology apply in the Fire Command System
Wu Bocai
..............
page:62-64
ARP depth analysis of the virus and block within the campus network
Zhou Changqi
..............
page:28-30
Study On the LAN security and prevention
Jia Jinling
..............
page:17-18
Enterprise Security Router Configuration
Huo Yanli
..............
page:36-38
Research and Application of an improved BP Neural Networks on system of Measurement and Control For Grain Storage
Zhang Xinghong;Znen Tong;Bao Hui
..............
page:73-75
Design and implementation of web page tamper-proof system based on jetty components
Luo Hongfei;Meng Qingsheng;Xu Zhonggan
..............
page:4-6
The Dsik File Transparent Encryption Technology
Li Weiguang;Guo Hui
..............
page:45-47
Analysis and Countermeasure for Application Situation of the Government Electronic Affairs
Luo Lanhua
..............
page:65-67
Computer Network Security Technology and Development Trend
Zheng Lihua
..............
page:7-8,27
Design and Implementation of Registration System for Network Examination based on J2EE Frame
Ning Yingying
..............
page:79-81
The Linux security server about installing various servers
Tang You
..............
page:56-58
OSPF on-demand in the circuit configuration on the research and application
Zhang Junhu;Hou Tiebing
..............
page:68-70
Improved aggregation algorithm in multi-source detection system
Peng Guangjun;Yu Jiang;Chang Chun;Yang Zongbo
..............
page:76-78
An improved method of humming music retrieval
Cheng Xiaoyan;Zhang Ming
..............
page:85-87
Campus Network Export Traffic Management and Optimization Based on IP-layer
Wu Xingyong;Yang Yong;Huang Ronghua
..............
page:94-96
Research of The Intrusion Detection Method Based On Clustering LS-SVM
Cheng Aihui;Gao Maoting
..............
page:14-16
Login management and file protection of computer
Lai Zongli;Li Yaojie
..............
page:31-33
Electronic Documents and its applications in E-Government
Yu Hongzhen;Zhou Dongchao
..............
page:51-52,40
An instant-open type of electronic lottery issuing scheme
Sun Jianan
..............
page:88-90,84