Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2013 Issue 5
The Technology Research of Reliable Transmission Base On The UDP
Bai Zheng;Liu Dengfeng;Sun Wenjun
..............page:34-36
Frequent queries the privacy protection in LBS
Lv Zhiyang;Zhao Jiong;Ahmed M.A.Alsayadi
..............page:76-79,72
A method to protect the text section based on Vxworks
Xiao Yongquan;Zhang Guo
..............page:64-65
A Tentative Study on Safety Threats and Shields of Web Application Programs
Wang Zhigang;Qu Shanguang;Wu Dongming
..............page:43-45
Study on the Series Message of Data Link
Guo Lingbo
..............page:61-63
Design and Implementation of Exam System Interface based on ExtJS Framework
Ye Guangzai;Jiang Wuxue;Liu Xiaowei
..............page:49-52
xin xi dong tai
..............page:80
Fault alarm management for the Intelligent grid network
Zhang Yanqing;Liang Kan
..............page:73-75,65
Based on "Technology+System"Computer Management Method Research
Chen Yang;Chen Hui
..............page:46-48
Cloud computing based file encryption transmission method
Hu Xiangyi;Xu Guanning;Du Liping
..............page:18-22
MongoDB in network behavior analysis and control system
He Shengtao
..............page:11-13
Design and Implementation of Secure SRUDP Protocol
Fan Huafeng;Chen Zhen
..............page:37-39
Network Management in Pervasive Computing Environment
Liu Mingju;Wang Yuanlong;Ji Houtao;Yu Jiaxin
..............page:26-29
Research on E-government System Security Monitoring
Liu Peng;Wu Yanyan;Wei Bin
..............page:40-42,36
Design of Digital Signature System Based on Combined Symmetric Key
Feng Fuwei;Li Ying;Du Liping;Zhao Guifen
..............page:30-33
Study of system about digital Forensics Technology
Liu Jianjun;Chen Guangxuan
..............page:8-10,13
An Analysis of Smartphone Security System
Li Lin;Li Qingyan
..............page:55-56,52