Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2011 Issue 4
Shallow disease control system of network security
Chen Tanghui
..............page:26-27,8
Design of Authenticaton System for Resident District Based on Voiceprint Recognition
Li Qing;Deng Yueming;Wang Yun;Mo Chongsheng;Liu Bin;He Hongping;Li Huiling
..............page:36-38
Availability static testing and evaluation program of mass storage system
Pan Qing;Wang Xiaojun;Zhuang Zena;Zhang Xiaoqing
..............page:33-35,58
A Distributed Trust Model in Mobile P2P Environments
Feng Jingyu;Zhang Yuqing
..............page:73-76
xin xi dong tai
..............page:1,80
The research of the mechanism of tile cache in GeoServer
Yang Hua;Liu Zhenyu;Xu Wenming
..............page:63-65
The Realization of Verifiable E-lottery Scheme Based on Internet
Ma Guoqun;Tu Rongfan;Cui Weiming;Liu Yining;Huang Juan
..............page:39-41
The Application of ATT7022B in the Intelligent Street Lighting Controller
Wang Baolu;Song Chunning;Zhou Xiaohua;Song Yunpeng
..............page:59-60,41
Research of security and maintenance of hospital network
Wang Haijian
..............page:56-58
UTM (Unified Threat Management):Survey
Liu Shenghua;Jin Zhipin;Liu Yunlong
..............page:12-13,11
the Bugs of PHP\'s Safe_mode Analyses
Feng Shuo;Li Yonyi
..............page:9-11
Research and Development on Process Neural Networks
Luo Juzhi;Zhou Yonghua
..............page:50-52
Analysis of current status and sevelopment of intrusion prevention technology
Xue Hui;Deng Jun;Ye Bailong
..............page:20-22
Use of flow control devices to manage and optmize campus network traffic
Shen Jinian;Xing Xuemei
..............page:14-16
Computer network security technology were discussed
Wang XinFeng
..............page:17-19
Control Strategy of Signalixed Intersections Base on Bus Priority
Lv Shengwei;Jiang Tai
..............page:31-32,19
Image Watermarking Robust to Geometric Attacks Based on Histogram Modification
Wu Kang;Lv Lingjuan;Yang Shengli;Sun Rui
..............page:46-49