Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2016 Issue 6
A New Model for Measuring the Integrity of Trusted Computing Platforms
XING Bin;,LIU Jiqiang;,HAN Zhen;
..............page:8-14
Research on Trajectory Privacy Preserving over Road Network Based on Voronoi Diagram
XIAO Jianchuan;,XU Li;,YE A-yong;,LIN Limei;
..............page:15-21
Research and Implementation of Active Dynamic Measurement Based on TPCM
TIAN Jiansheng;,ZHAN Jing;
..............page:22-27
Error Bit Correction of ECC Attack Based on Grover Quantum Intermediate Encounter Search Algorithm
JIA Huihui;,WANG Chao;,GU Jian;,LU Zhen;
..............page:28-34
An Improved Graph Partitioning Algorithm for User Behavior Abnormal Detection
YANG Lianqun;,WEN Jinying;,LIU Shufa;,WANG Feng;
..............page:35-40
Research on Quantitative Assessment Model for Internet Worm Threat
DUAN Bin;,HAN Weihong;,LI Aiping;
..............page:41-47
Research on Heap Spray for Integration of Multiple Technologies
MAO Yanying;,LUO Senlin;
..............page:48-55
Research on Web Server Attacks Logs Analysis
DENG Shiqi;,LIU Xiaoming;,WU Xudong;,LEI Min;
..............page:56-61
Research on a New Dynamic Threshold Digital Signature Scheme
ZHANG Yansheng;,WANG Xueming;,QIU Gege;
..............page:62-67
Construction and Data Mining of Social Network Based on Communication Log
QU Yang;,WANG Yongjian;,PENG Ruxiang;,JIANG Guoqing;
..............page:68-73
2016 nian 4 yue ji suan ji bing du yi qing fen xi
mu de bao ;, liu wei ;
..............page:86-86
2016 nian 4 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............page:87-88
2016 nian 4 yue wang luo an quan jian ce shu ju fa bu
liu zuo ;, wang xiao qun ;
..............page:89-90