Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2011 Issue 6
Application Research of Digital Certificate Technology in Internet Real-name System
WU Qi-cong;GU Jian;LU Zhen
..............page:91-93,96
Study on Cloud Computing Applications\' Security of Smart Grid
YU Yong;LIN Wei-min;DENG Song;CHE Jian-hua
..............page:41-43
Security of Contactless IC Card
WU Bin
..............page:26-28
The Internet of Things Security Protection Level of the Research
WANG Ning;LIU Zhi-jun
..............page:5-6,10
Based on the ARM+Linux High-speed Data Acquisition System
DENG Zhi-long
..............page:80-82
Computer Virus Analysis of 2011 May
LIU Wei;MENG Bin
..............page:97-97
Discussion On Key Authentic Degree of Cryptosystem
WANG Yong
..............page:63-66
Cloud Computing Environment of Information Security Level of Protection
DONG Jian-feng;PEI Li-jun;WANG Lan-ying
..............page:38-40
Security Application Research of IOT
NIE Yuan -ming;ZHANG Hong-jun;HAN Hui-liang
..............page:20-21,32
Network Security Monitoring Data Analysis Report of 2011 April
ZHOU Yong-lin
..............page:99-100
Cloud Computing Security Research
LUO Zu-ying
..............page:33-35
Security Analysis and Improvement of QQ Login Protocol
YI Zong-xiang
..............page:85-87
Research of Network Performance Measurement System and Design of Its Framework
SU Hong-qi;WANG Jia;LI Xiao-yan
..............page:83-84
Ten Critical Vulnerabilities Analysis Report May 2011
National Computer Networks Intrusion Protection Ce
..............page:98-98,100
Wireless LAN to Realize Information System Security Level Protection
LI Chun-fang;LI Chao;ZHAN Gao-feng
..............page:17-19
SNS Security Problem in Web2.0 Era
SHAN Cheng-Xian
..............page:60-62
Anti-cryptography Quantum Computing Research (serial)
ZHAG Huan-guo;WANG Hou-zhen
..............page:56-59
Forensics Analysis of File Slack Based Statistic Techniques
LI Bing-long;RU Bei;WANG Lu
..............page:69-71
xin xi dong tai
..............page:4,13,62,71,79,82
TD-LTE Impact Analysis of Information Security and Countermeasures
HAO Wen-jiang;WU Jie
..............page:29-32
Briefly Analysis on Classic and New Trojan Horse
YIN Jun
..............page:44-47
The Complex Network Environment Troubleshooting Methods and Defense Strategy Research
ZHOU Li-ping;YANG Yong;XIAO Ge-xin
..............page:53-55
Cloud Computing Services Security Issues
LIU Qing
..............page:36-37