Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2011 Issue 3
The Bank on the Net the Identity Authentication Technology Explore
CHEN Xiao-long;YU Yue-fei
..............
page:15-16
Public Computing Resources Identity Authentication and Safety Protection Encryption Agreement
JI Hui
..............
page:17-20
Key Problems in Developing Information Security Policies Research
ZHAO Zhang-jie;LI Chen-yang;LIU Hai-feng
..............
page:49-52
Fingerprint Recognition Technology in Status Authentication Application and Research
LI Zhen-shan
..............
page:12-14
An Overview Oil IDM Strategy
LI Qiu-rui;DU Yan-hui
..............
page:23-25
Application of Electronic Identity Authentication Technology
GUO Xiao-biao;ZENG Zhi;GU Li-ping
..............
page:21-22,25
Research Progress and Development of Security Technologies in the Internet Of Things
LANG Wei-min
..............
page:53-56
Ordered Activities Depending on eID in Cyber Virtual Society
YAN Ze-ming;ZOU Xiang;JIN Bo
..............
page:3-4,14
The Procedure Criterions of Electronic Evidence Fixation Research
YAN Yan;LV Hao
..............
page:37-38
2010 nian di er zhi di san ji du jian ce he ge an quan chan pin ming dan fa bu
..............
page:81-84
Thinking on the Competence and Validity of Electronic Evidence
LIU Yang
..............
page:43-45
guan che dian zi qian ming fa , wei dian zi shang wu fa zhan dian ding jian shi ji chu
ou yang wu ; kuang ye
..............
page:1-2
Brifely Analysis on Legal Status and Identification of Electronic Evidence
HUA Xiu-yan
..............
page:46-48,74
A Technical Study of Analyzing Computer System for Computer Forensics
HUANG Bu-gen
..............
page:39-42
Electronic Identity Authentication System of the Institutional Arrangements and Legal Environment
ZHANG Ye
..............
page:26-27,66
Ten Critical Vulnerabilities Analysis Report February 2011
National Computer Networks Intrusion Protection Ce
..............
page:75,77
zhong yang he guo jia ji guan you guan bu men xin xi an quan deng ji bao hu gong zuo jing yan zhai bian
..............
page:73-74
The Appraisal and Suggestion of Public Security e-Government
ZHANG Yan-ling;LI Xu
..............
page:70-72
Analysis of Design and Implementation of Police Information Integration Application Platform Based on SOA
LIU Chao;JIANG Xiao-gang;ZHU He-jun
..............
page:63-66
Brief Discussion of Search Engine and National Information Security
ZOU Xue-qiang;PAN Jin
..............
page:67-69
C2 Password and Its Safety Research
YANG Jia;LU Qing-yuan
..............
page:57-59
The Implementation of DES in Secret Sharing Scheme
QIU Wei-xing;GUAN Yi-ming;HUANG Hua
..............
page:60-62
The Development Trend of the Network Identity Management
CHEN Bing;ZOU Xiang;ZHOU Guo-yong
..............
page:5-8
The Legal Nature of Electronic Authentication Inquiry
ZHU Hai-jiao
..............
page:28-30
Electronic Identity Authentication in Biometric Technology Legal Issues the Comparative Study
LIU Yi-cheng
..............
page:31-33,36
Electronic Evidence Source Uncertainties of Research
WANG Ning;LIU Zhi-jun;MAI Yong-hao
..............
page:34-36
kai qi yun ji suan an quan shi dai feng deng guo zhu ren zai yocsef lun tan shang de jiang hua zhai yao
feng deng guo
..............
page:前插1,2
Concerning the Electronic Payment Identity Authentication Technology
GUAN Zhen-sheng
..............
page:9-11
Analysis of Computer Virus February 2011
LIU Wei;MENG Bin
..............
page:78-78
guan yu zu zhi 2011 nian gong an ke ji cheng guo tui guang yin dao ji hua cheng guo shen bao de tong zhi
..............
page:79-80
Network Security Monitoring Data Analysis Report of 2011 January
ZHANG Sheng-li
..............
page:76-77