Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2015 Issue 7
Analysis and Research on Big Data Security in Smart City
CHEN Hong-song;HAN Zhi;DENG Shu-ning;School of Computer and Communication Engineering;University of Science and Technology Beijing;
..............page:1-6
Cloud Data Integrity Verification Scheme without Bilinear Pairing
ZHAO Yang;REN Hua-qiang;XIONG Hu;CHEN Yang;School of Information and Software Engineering;University of Electronic Science and Technology of China;
..............page:7-12
Application and Implementation of Hadoop Cloud Computing Technology in Junk Message Filtering
SUN Da-peng;Liaoning Branch of CNCERT;
..............page:13-19
Research on Multi-Level Management Mechanism in Trusted Cloud Computing
MA Wei;HAN Zhen;CHENG Yang;School of Computer and Information Technology of Beijing Jiaotong University;
..............page:20-25
Research on FTP Protocol Identification Method Based on Tagged Word
WANG Jing-zhong;WANG Wei-meng;College of Information and Electrical Engineering;North China University of Technology;
..............page:26-31
Research on the Identification Scheme of Io T Based on Space Coordinates
ZHAO Ying-chuan;XU Ke;Department of Computer Science and Technology;Tsinghua University;
..............page:32-40
Research on Full Homomorphic Encryption Scheme Based on Binary LWE
WANG Zhi-gang;MA Chun-guang;SHI Xiao-qian;College of Computer Science and Technology;Harbin Engineering University;College of National Secrecy;Harbin Engineering University;
..............page:41-50
Provable Security Research on User Authentication Scheme of Roaming Network
LI Hui-zhi;HAN Guang-guo;WANG Yi;College of Science;Hangzhou Dianzi University;
..............page:51-57
Detection of Mobile Terminal Malware Based on Kernel Log
LI Jian-yi;LI Hui;HUANG Meng-yuan;School of Computer Science;Beijing University of Posts and Telecommunications;
..............page:58-63
A DTW Signature Verification System Based on Statistical Modeling
YAN Chen-dan;YANG Yang;CHENG Jiu-jun;SHAO Jian-yu;Department of Computer Science & Engineering;Tongji University;Key Laboratory of Embedded System and Service Computing of Ministry of Education;Tongji University;
..............page:64-70
Research on Authentication Protocol Security Based on Formal Verification Tool
DUAN Ran;XU Nai-yang;HU Ai-qun;School of Information and Engineering;Southeast University;
..............page:71-76
Research on Community Detection Method for Social Networks Based on User Interaction and Similarity
XU Wei;LIN Bo-gang;LIN Si-juan;YANG Yang;College of Mathematics and Computer Science;Fuzhou University;Key Lab of Information Security of Network System in Fujian Province;
..............page:77-83
Research on the Popular Microblogging Classification Based on User Clustering
ZHANG Shi-hao;GU Yi-jun;ZHANG Jun-hao;School of Cybersecurity;People’s Public Security University of China;
..............page:84-89
2015 nian 5 yue ji suan ji bing du yi qing fen xi
feng jun liang ; meng bin ;
..............page:90
2015 nian 5 yue wang luo an quan jian ce shu ju fa bu
xu na ; zhao zuo ;
..............page:93-94
wang yu dong tai
..............page:95-98