Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2009 Issue 7
xu yan
shen chang xiang
..............
page:前插1
The methods of trusted forensic based on waterfall model
SUN Guo-zi;YU Chao;CHEN Dan-wei;JIN Xian-li
..............
page:4
A Survey of Security Quantitative Analysis for Intrusion Tolerant System
HUANG Jian-hua;YANG Tian-yang
..............
page:7
ding pu zhong duan an quan yu fang xie lou guan li
wan jun
..............
page:77
zhong da wang luo an quan shi jian jie shi ying yong ruan jian an quan zhong yao xing
zhou yong lin
..............
page:76
Practice in the Subject Construction and Specialty Construction in China University of Geosciences(Wuhan)
WANG Mao-cai;DAI Guang-ming;YU Lin-chen;KANG Xiao-jun
..............
page:73
gong an yuan xiao xin xi an quan ren cai pei yang mo shi tan jiu
zhang bo yun ; zuo xi ai
..............
page:71
xin xi an quan zhuan ye xue sheng an quan bian ma neng li pei yang de tan suo
chen bo ; yu zuo ; ji gen lin
..............
page:68
An exploration of the teaching method of cryptography and its implementation
SUN Jing;FU De-sheng
..............
page:65
Security Infrastructure of Cloud Computing
GUO Le-shen;ZHANG Nai-jing;SHANG jin-gang
..............
page:62
The analysis of information security based on IP address
WANG Bin-jun;BI Qian-qian;WANG Jing-ya
..............
page:58
A P2P Trust Model Based on Trusted Computing
HE Li-Bao;HUANG Liu-Sheng;YANG Wei;LUO Yong-Long
..............
page:53
tcg-tnc ke xin wang luo lian jie xi tong she ji yu shi xian
chen zhen ; deng fa chao ; huang shi hai ; peng xue hai ; li guo dong ; jiang xin ; luo an an ; peng dong sheng ; zhang ying ; zhang run hua
..............
page:49
yi tuo deng ji an quan bao hu ti xi kai zhan xin xi an quan zi xun fu wu
wu hong zhong
..............
page:47
Multi-Rules Encryption System based on file system filter driver
FU De-sheng;PAN Yi
..............
page:44
A Image Steganalysis Method Based on Characteristic Function Moments of Wavelet Subbands and PCA
SUN Zi-wen;ZHOU Zhi-ping;LI Hui
..............
page:41
An Evaluating Scheme for Embedding Security of Natural Language Watermarking
YU Zhen-shan;HUANG Liu-sheng;CHEN Zhi-li;LI iing-jun;YANG Wei;ZHAO Xin-xin
..............
page:38
Blind Detection of Copy-Move Forgery in Digital Images Based on Wavelet and Moment Invariants
ZHOU Zhi-pin;ZHANG Xiao-xiang;SUN Zi-wen
..............
page:35
A New File encryption Method
WU Zhen-dong;ZHANG Yi-han
..............
page:32
Research of outlier detection based adaptive intrusion detection techniques
FANG Yu-ke;FU Yan;ZHOU Jun-lin;ZENG Jin-quan
..............
page:28
The Digital Binary Image Blindly Watermarking Algorithm Based on Wavelet
JIANG Tian-fa;WANG Li;JIANG Wei;XIONG Xiang-Guang
..............
page:24
Research on Aspect oriented technique application in web service secure composition
YANG Yang;WU Li-fa;HE Zheng-qiu
..............
page:21
Research on high-rate distributed denial of services attack
WANG Dong-qi;GUO Jian-feng;CHANG Gui-ran
..............
page:17
A digital signature scheme based on discrete logarith
SHEN Yong-jun;ZHAO Shu-lan
..............
page:15
Intuitionistic fuzzy theory - neural network basing pornographic image recognizing algorithm
Wang Xiao-yin;Hu Chang-zhen
..............
page:12
Research on Worm Network Evolution Based on Random Walkers
CHEN Jun-hua;HU Chang-zhen
..............
page:10