Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2012 Issue 10
Perfect Contrast Visual Cryptography Scheme for General Access Structures
he wen cai ; dong zuo cong ; han zuo zuo ; liu pei he ; zhao fei ; shang yi zuo
..............page:20-22
Open integration based on service bearing network design
tang chuang wei ; tan min sheng ; peng qun zhong ; li yang wei
..............page:41-43
The Security Studies Based On Wireless Network
tang tao
..............page:18-19,28
jia neng bo lan hui 2012 zuo fen kai mu
li ming
..............page:4-4
Research and improvement on FP-tree algorithm of association rule
liu chong ; chen xiao hui ; song xiao xiao
..............page:53-55
Research of Speech Recognition System Based on VC
li hui ; feng yan ; chen zuo
..............page:35-37
Analysis and security precautions of the common computer theft technologies
he wen cai ; liu pei he ; dong zuo cong ; yan xiao ; zheng zuo ; du min
..............page:5-8
Cluster Routing Algorithm For Wireless Sensor Network
xu dong ju ; zheng ming chun
..............page:74-77
The Protocol of Mobile Ad Hoc and MAC Based on CDMA
yuan shu dan ; niu qin zhou
..............page:12-14
MESH Network Technology in Fire Emergency Communication Applicatiom
xing xue chu ; zeng fan bing
..............page:68-70
Research of Web-mail Monitor Technology Based on NDIS
luo li ming ; wu chun hua ; yuan kai guo
..............page:29-32
The key technologies analysis and performance test of the MSS
song zhi qiang
..............page:33-34,37
Construction of high performance of WEB site
xiao zuo
..............page:56-57,52
The design and research of integrated query service platform of digital campus
zhang lei ; he chang lin ; li hai jun
..............page:48-49,73
On the legal management of internet-related violations
wang dai
..............page:78-79,70
SIP authentication scheme based on Secret Sharing
he wen cai ; zhao fei ; han zuo zuo ; sun jin hui ; dong zuo cong
..............page:15-17
yun shu ju an quan jie jue fang an
..............page:1-1
Study on Application of Cloud Computing
chen guo wei
..............page:23-25
A Malware Detection Method Based On Active Learning For Database
che jing ; zhang zuo
..............page:62-64
Virtual desktop application security analysis and recommendations
zheng zhi yong ; lv yuan da ; wang yi
..............page:50-52