Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2011 Issue 3
The Bank on the Net the Identity Authentication Technology Explore
CHEN Xiao-long;YU Yue-fei
..............page:15-16
Key Problems in Developing Information Security Policies Research
ZHAO Zhang-jie;LI Chen-yang;LIU Hai-feng
..............page:49-52
An Overview Oil IDM Strategy
LI Qiu-rui;DU Yan-hui
..............page:23-25
Application of Electronic Identity Authentication Technology
GUO Xiao-biao;ZENG Zhi;GU Li-ping
..............page:21-22,25
Ordered Activities Depending on eID in Cyber Virtual Society
YAN Ze-ming;ZOU Xiang;JIN Bo
..............page:3-4,14
Ten Critical Vulnerabilities Analysis Report February 2011
National Computer Networks Intrusion Protection Ce
..............page:75,77
The Appraisal and Suggestion of Public Security e-Government
ZHANG Yan-ling;LI Xu
..............page:70-72
Brief Discussion of Search Engine and National Information Security
ZOU Xue-qiang;PAN Jin
..............page:67-69
C2 Password and Its Safety Research
YANG Jia;LU Qing-yuan
..............page:57-59
The Implementation of DES in Secret Sharing Scheme
QIU Wei-xing;GUAN Yi-ming;HUANG Hua
..............page:60-62
The Development Trend of the Network Identity Management
CHEN Bing;ZOU Xiang;ZHOU Guo-yong
..............page:5-8
The Legal Nature of Electronic Authentication Inquiry
ZHU Hai-jiao
..............page:28-30
Electronic Evidence Source Uncertainties of Research
WANG Ning;LIU Zhi-jun;MAI Yong-hao
..............page:34-36
Analysis of Computer Virus February 2011
LIU Wei;MENG Bin
..............page:78-78