Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2016 Issue 1
A Scheme of Public Encryption Keyword Search with Indistinguishable Trapdoor
ZHAO Yang;BAO Wenyi;XIONG Hu;QIN Zhiguang;School of Information and Software Engineering;University of Electronic Science and Technology of China;
..............page:1-5
A Network Intrusion Detection Method Based on Partial Least Squares
CHEN Shanxiong;PENG Maoling;PENG Xihua;College of Computer and Information Science;Southwest University;Chongqing City Management College;
..............page:6-10
Threat Analysis and Detection Techniques of Hardware Trojans
ZHOU Yu;YU Zongguang;No.58 Research Institute;China Electronic Technology Group Corporation;China Academy of Electronics and Information Technology;School of Microelectornics;Xidian University;
..............page:11-17
Research on the Dynamic Multi-copy Provable Data Possession Scheme Based on Map Version Table
LANG Weimin;CHEN Kai;PLA Institute of National Defense Information;
..............page:18-23
Research on Quantum Information Sharing of a Three-particle Entangled State via a GHZ State
GUO Wei;XIE Shucui;ZHANG Jianzhong;DU Hongzhen;School of Mathematics and Information Science;Shaanxi Normal University;School of Science;Xi’an University of Posts and Telecommunications;Mathematics Department;Baoji University of Art and Science;
..............page:24-28
An Online Detection System for Advanced Malware Based on Virtual Execution Technology
ZHENG Shengjun;GUO Longhua;CHEN Jian;NAN Shujun;Beijing GuoDian Tong Network Technology Co.;Ltd;Shanghai JiaoTong University;Information and Telecommunication Branch of State Grid Zhejiang Electric Power Company;
..............page:29-33
Design of Network Covert Transmission Scheme Based on TCP
LOU Jiapeng;ZHANG Meng;FU Peng;ZHANG Kai;Beijing Electronic Science & Technology Institute;IT Academy;Xidian University;
..............page:34-39
Analysis of Model of QQ Forensic in Android System
LI Qiang;LIU Baoxu;JIANG Zhengwei;YAN Jian;Institute of Information Engineering;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:40-44
Mobile Malware Detection Based on Optimized Fuzzy C-Means
HUANG Shifeng;GUO Yajun;CUI Jianqun;ZENG Qingjiang;School of Computer;Central China Normal University;
..............page:45-50
Analysis and Implementation of QQ Software Protocol Based on DPI Technology
ZHENG Lifen;XIN Yang;Information Security Center;Beijing University of Posts and Telecommunications;
..............page:51-58
Design and Implementation of a Malware Detection System for Mobile Payment on the Cloud
SHU Yaqian;FU Anmin;HUANG Zhentao;School of Computer Science and Engineering;Nanjing University of Science and Technology;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:59-63
Research on RFID Authentication Technology Based on Two-way Authentication Protocol
ZHANG Yuting;YAN Chenghua;Department of Information Security;Naval University of Engineering;
..............page:64-69
Overviews of Network Intrusion Evasion and Defense Techniques
SHI Tingting;ZHAO Youjian;Department of Computer Science and Technology;Tsinghua University;
..............page:70-74
Design and Implementation of a Multi-layer Filtering Detection Model for Malicious URL
LIU Jian;ZHAO Gang;ZHENG Yunpeng;School of Information Management;Beijing Information Science & Technology University;
..............page:75-80
An Automatic Classifi cation System for Microblogging
ZHANG Shihao;GU Yijun;ZHANG Junhao;School of Cybersecurity;People’s Public Security University of China;
..............page:81-87
Research and Design on Information Security Architecture in Smart City
ZHENG Jiangbo;ZHANG Jianhua;Nei Meng Gu Hulunbeier Public Security Bureau;Beijing Bi Trustar Science & Technology Company;
..............page:88-93
2015 nian 11 yue ji suan ji bing du yi qing fen xi
zhang rui ; liu wei ;
..............page:94
2015 nian 11 yue wang luo an quan jian ce shu ju fa bu
yao li ; chen yang ;
..............page:97-98