Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2009 Issue 7
xu yan
shen chang xiang
..............page:前插1
The methods of trusted forensic based on waterfall model
SUN Guo-zi;YU Chao;CHEN Dan-wei;JIN Xian-li
..............page:4
A Survey of Security Quantitative Analysis for Intrusion Tolerant System
HUANG Jian-hua;YANG Tian-yang
..............page:7
Practice in the Subject Construction and Specialty Construction in China University of Geosciences(Wuhan)
WANG Mao-cai;DAI Guang-ming;YU Lin-chen;KANG Xiao-jun
..............page:73
gong an yuan xiao xin xi an quan ren cai pei yang mo shi tan jiu
zhang bo yun ; zuo xi ai
..............page:71
xin xi an quan zhuan ye xue sheng an quan bian ma neng li pei yang de tan suo
chen bo ; yu zuo ; ji gen lin
..............page:68
Security Infrastructure of Cloud Computing
GUO Le-shen;ZHANG Nai-jing;SHANG jin-gang
..............page:62
The analysis of information security based on IP address
WANG Bin-jun;BI Qian-qian;WANG Jing-ya
..............page:58
A P2P Trust Model Based on Trusted Computing
HE Li-Bao;HUANG Liu-Sheng;YANG Wei;LUO Yong-Long
..............page:53
tcg-tnc ke xin wang luo lian jie xi tong she ji yu shi xian
chen zhen ; deng fa chao ; huang shi hai ; peng xue hai ; li guo dong ; jiang xin ; luo an an ; peng dong sheng ; zhang ying ; zhang run hua
..............page:49
Multi-Rules Encryption System based on file system filter driver
FU De-sheng;PAN Yi
..............page:44
An Evaluating Scheme for Embedding Security of Natural Language Watermarking
YU Zhen-shan;HUANG Liu-sheng;CHEN Zhi-li;LI iing-jun;YANG Wei;ZHAO Xin-xin
..............page:38
Blind Detection of Copy-Move Forgery in Digital Images Based on Wavelet and Moment Invariants
ZHOU Zhi-pin;ZHANG Xiao-xiang;SUN Zi-wen
..............page:35
A New File encryption Method
WU Zhen-dong;ZHANG Yi-han
..............page:32
Research of outlier detection based adaptive intrusion detection techniques
FANG Yu-ke;FU Yan;ZHOU Jun-lin;ZENG Jin-quan
..............page:28
The Digital Binary Image Blindly Watermarking Algorithm Based on Wavelet
JIANG Tian-fa;WANG Li;JIANG Wei;XIONG Xiang-Guang
..............page:24
Research on Aspect oriented technique application in web service secure composition
YANG Yang;WU Li-fa;HE Zheng-qiu
..............page:21
Research on high-rate distributed denial of services attack
WANG Dong-qi;GUO Jian-feng;CHANG Gui-ran
..............page:17
A digital signature scheme based on discrete logarith
SHEN Yong-jun;ZHAO Shu-lan
..............page:15
Research on Worm Network Evolution Based on Random Walkers
CHEN Jun-hua;HU Chang-zhen
..............page:10