Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2011 Issue 6
The Comparison of Increasing Information Security Consciousness between China and America
HE Jing-sha;WEI Qian;ZHANG Xing
..............
page:88-90
Application Research of Digital Certificate Technology in Internet Real-name System
WU Qi-cong;GU Jian;LU Zhen
..............
page:91-93,96
Research of Electronic Substance Evidence "Polluted" before Distill and Extraction
ZOU Guo-qiang
..............
page:75-76
Study on Cloud Computing Applications\' Security of Smart Grid
YU Yong;LIN Wei-min;DENG Song;CHE Jian-hua
..............
page:41-43
Research Based on Spatial Data Transfer Security Technology of GML and Digital Signature
PENG Hai-bo;WANG Qi-song
..............
page:51-52,59
Security of Contactless IC Card
WU Bin
..............
page:26-28
Based on the Rough Set of Association Rules Mining in the Application of Public Security Information
LIU Xiu-ru
..............
page:77-79
The Internet of Things Security Protection Level of the Research
WANG Ning;LIU Zhi-jun
..............
page:5-6,10
Based on the ARM+Linux High-speed Data Acquisition System
DENG Zhi-long
..............
page:80-82
Computer Virus Analysis of 2011 May
LIU Wei;MENG Bin
..............
page:97-97
Discussion On Key Authentic Degree of Cryptosystem
WANG Yong
..............
page:63-66
Cloud Computing Environment of Information Security Level of Protection
DONG Jian-feng;PEI Li-jun;WANG Lan-ying
..............
page:38-40
Security Application Research of IOT
NIE Yuan -ming;ZHANG Hong-jun;HAN Hui-liang
..............
page:20-21,32
Network Security Monitoring Data Analysis Report of 2011 April
ZHOU Yong-lin
..............
page:99-100
Cloud Computing Security Research
LUO Zu-ying
..............
page:33-35
Security Analysis and Improvement of QQ Login Protocol
YI Zong-xiang
..............
page:85-87
Research of Network Performance Measurement System and Design of Its Framework
SU Hong-qi;WANG Jia;LI Xiao-yan
..............
page:83-84
Ten Critical Vulnerabilities Analysis Report May 2011
National Computer Networks Intrusion Protection Ce
..............
page:98-98,100
Wireless LAN to Realize Information System Security Level Protection
LI Chun-fang;LI Chao;ZHAN Gao-feng
..............
page:17-19
The Research of IP Address Locating and Tracing Technology in Internet Crimes Investigation
ZHANG Yue-xian
..............
page:72-74
SNS Security Problem in Web2.0 Era
SHAN Cheng-Xian
..............
page:60-62
Anti-cryptography Quantum Computing Research (serial)
ZHAG Huan-guo;WANG Hou-zhen
..............
page:56-59
Forensics Analysis of File Slack Based Statistic Techniques
LI Bing-long;RU Bei;WANG Lu
..............
page:69-71
Population and Family Planning Information System Research Based on Level Protection System
CAI Peng-cheng;FENG Fang-hui
..............
page:14-16,66
Three Nets Fusion of Information System Level Protection Under the Division Standard Research
ZHANG Jun-qiang
..............
page:7-10
Cloud Environment Protection Works Carried out Under Level Thinking
SUN Tie
..............
page:11-13
xin xi dong tai
..............
page:4,13,62,71,79,82
Design and Implementation of Active Simulation for EM Card Based on RFID Technology
JIN Hua;ZHAO Feng
..............
page:48-50
TD-LTE Impact Analysis of Information Security and Countermeasures
HAO Wen-jiang;WU Jie
..............
page:29-32
Briefly Analysis on Classic and New Trojan Horse
YIN Jun
..............
page:44-47
A Distributed Defense Scheme Against Traffic Injection Attacks in Wireless Cognitive Sensor Network (WCSN)
LANG Wei-min;ZHOU Jian-hua;LI Jian-jun
..............
page:22-25
Research of the Relationship Between Popular Security Protection Model and Security Protection Requirements for Classified Protection of Information System Security
MA Li;BI Ma-ning;REN Wei-hong
..............
page:1-4
Memory Leak Analysis for the GB Forth Level Secure Operating System
DING Li-ping
..............
page:67-68
The Complex Network Environment Troubleshooting Methods and Defense Strategy Research
ZHOU Li-ping;YANG Yong;XIAO Ge-xin
..............
page:53-55
ji ji mian dui xin de wang luo an quan tiao zhan zuo guo hua fu bu chang zai "2011 nian zhong guo dian xin ye wang luo yu xin xi an quan gao ceng yan tao hui " shang de jiang hua zhai yao
..............
page:前插1
The Research on the Volatility of Financial Time Series based on Mallat Algorithm
TANG Jie;CHENG Xi-jun
..............
page:94-96
Cloud Computing Services Security Issues
LIU Qing
..............
page:36-37