Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2013 Issue 5
The Technology Research of Reliable Transmission Base On The UDP
Bai Zheng;Liu Dengfeng;Sun Wenjun
..............
page:34-36
Frequent queries the privacy protection in LBS
Lv Zhiyang;Zhao Jiong;Ahmed M.A.Alsayadi
..............
page:76-79,72
A method to protect the text section based on Vxworks
Xiao Yongquan;Zhang Guo
..............
page:64-65
The discussion based on Web2.0 technology on the University learning community
Zhang Yongmei
..............
page:66-67,63
A Tentative Study on Safety Threats and Shields of Web Application Programs
Wang Zhigang;Qu Shanguang;Wu Dongming
..............
page:43-45
Study on the Series Message of Data Link
Guo Lingbo
..............
page:61-63
Commercial banks how to effectively protect the information security of online banking
Xu Ting
..............
page:53-54,48
Computer Network Curriculum Group Construction Oriented to the Industrial Cluster
Yan Wei
..............
page:23-25
Design and Implementation of Exam System Interface based on ExtJS Framework
Ye Guangzai;Jiang Wuxue;Liu Xiaowei
..............
page:49-52
The Application of RADIUS Authentication in the Management System of Campus Computer Network Equipment
Li Haijun
..............
page:70-72
Based on weighted moving window method of intrusion detection model design
Qian Feng
..............
page:14-17
zhi neng an xin , jia neng an fang miao zhun zhong guo shi chang gao di jia neng quan mian bu ju gao duan an fang zheng ti jie jue fang an
..............
page:4
xin xi dong tai
..............
page:80
Fault alarm management for the Intelligent grid network
Zhang Yanqing;Liang Kan
..............
page:73-75,65
Based on "Technology+System"Computer Management Method Research
Chen Yang;Chen Hui
..............
page:46-48
voi zhuo mian xu ni hua de chuang xin
..............
page:5
Cloud computing based file encryption transmission method
Hu Xiangyi;Xu Guanning;Du Liping
..............
page:18-22
The construction and practice of occupation college skills competition in information security base
Lu Xiaoli
..............
page:59-60
The Research on the "2+1" Computer Network Talent Training Mode Oriented to the Industrial Cluster
Yan Wei
..............
page:57-58,29
wang luo fen xi shi nian mo jian ke lai de wang luo fen xi shi nian zhi lv
..............
page:6-7
MongoDB in network behavior analysis and control system
He Shengtao
..............
page:11-13
Design and Implementation of Secure SRUDP Protocol
Fan Huafeng;Chen Zhen
..............
page:37-39
Network Management in Pervasive Computing Environment
Liu Mingju;Wang Yuanlong;Ji Houtao;Yu Jiaxin
..............
page:26-29
Research on E-government System Security Monitoring
Liu Peng;Wu Yanyan;Wei Bin
..............
page:40-42,36
Design of Digital Signature System Based on Combined Symmetric Key
Feng Fuwei;Li Ying;Du Liping;Zhao Guifen
..............
page:30-33
Study of system about digital Forensics Technology
Liu Jianjun;Chen Guangxuan
..............
page:8-10,13
An Analysis of Smartphone Security System
Li Lin;Li Qingyan
..............
page:55-56,52
ARP spoofing/MITM attack Prevention in the two layer switch
Zhu Kai
..............
page:68-69,45