Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2011 Issue 4
Shallow disease control system of network security
Chen Tanghui
..............
page:26-27,8
Discussion on the Management and Maintenance of the Universities\' Computer Laboratory
Yang Ping
..............
page:28-30
A Study on the Technology Solution for E-Commerce Security Associate Professor
Jiang Li
..............
page:66-69,72
Design of Authenticaton System for Resident District Based on Voiceprint Recognition
Li Qing;Deng Yueming;Wang Yun;Mo Chongsheng;Liu Bin;He Hongping;Li Huiling
..............
page:36-38
Availability static testing and evaluation program of mass storage system
Pan Qing;Wang Xiaojun;Zhuang Zena;Zhang Xiaoqing
..............
page:33-35,58
A Distributed Trust Model in Mobile P2P Environments
Feng Jingyu;Zhang Yuqing
..............
page:73-76
Constructing a Centralized Security Protection System for Desktop Computers
Yu Xinsheng
..............
page:70-72
Improved Iocation-based Dynamic Source Routing Protocol
Dai Chi
..............
page:77-79
xin xi dong tai
..............
page:1,80
The Analyze of Security Risk On Electronic Government System
Wang Meng
..............
page:6-8
The research of the mechanism of tile cache in GeoServer
Yang Hua;Liu Zhenyu;Xu Wenming
..............
page:63-65
A Model of Database Concurrency Control with Locking Mechanism Based on Extended Colored Petri Net
Chen Yanzhou;Feng Chaohui
..............
page:42-45
The Analysis and Comparison of the methods of evaluate the network security risk
Qin Deze;Meng Junquan
..............
page:23-25
The Realization of Verifiable E-lottery Scheme Based on Internet
Ma Guoqun;Tu Rongfan;Cui Weiming;Liu Yining;Huang Juan
..............
page:39-41
AHP based on fuzzy comprehensive evaluation of university web site
Xing Wenchao
..............
page:53-55
The Application of ATT7022B in the Intelligent Street Lighting Controller
Wang Baolu;Song Chunning;Zhou Xiaohua;Song Yunpeng
..............
page:59-60,41
Research of security and maintenance of hospital network
Wang Haijian
..............
page:56-58
UTM (Unified Threat Management):Survey
Liu Shenghua;Jin Zhipin;Liu Yunlong
..............
page:12-13,11
the Bugs of PHP\'s Safe_mode Analyses
Feng Shuo;Li Yonyi
..............
page:9-11
Research and Development on Process Neural Networks
Luo Juzhi;Zhou Yonghua
..............
page:50-52
Analysis of current status and sevelopment of intrusion prevention technology
Xue Hui;Deng Jun;Ye Bailong
..............
page:20-22
Use of flow control devices to manage and optmize campus network traffic
Shen Jinian;Xing Xuemei
..............
page:14-16
Computer network security technology were discussed
Wang XinFeng
..............
page:17-19
Research and An improvement on Apriori Algorithm based on mining association rules
Wang Zheng;Zhou Guoguang
..............
page:61-62
Control Strategy of Signalixed Intersections Base on Bus Priority
Lv Shengwei;Jiang Tai
..............
page:31-32,19
Image Watermarking Robust to Geometric Attacks Based on Histogram Modification
Wu Kang;Lv Lingjuan;Yang Shengli;Sun Rui
..............
page:46-49
qian xi gong an ji guan yu hu lian wang an quan guan li gong zuo ji zhi
zhao wen ning
..............
page:4-5