Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 June 2011, Volume 11 Issue 5
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2011, 11 (
5
): 0-0.
Abstract
(
262
)
PDF
(1421KB) (
79
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
5
): 0-0.
Abstract
(
143
)
PDF
(207KB) (
40
)
NULL
Related Articles
|
Metrics
Select
Anti-cryptography Quantum Computing Research(continued)
2011, 11 (
5
): 0-0.
Abstract
(
213
)
PDF
(329KB) (
373
)
NULL
Related Articles
|
Metrics
Select
Design, Implementation and Case Study for a Terra Based DRM Platform
2011, 11 (
5
): 0-0.
Abstract
(
148
)
PDF
(300KB) (
96
)
NULL
Related Articles
|
Metrics
Select
The Research of Security Authentication Protocol Based On Application Layer of TCP/IP
2011, 11 (
5
): 0-0.
Abstract
(
171
)
PDF
(210KB) (
141
)
NULL
Related Articles
|
Metrics
Select
Analysis and Realization of a Convert Short Messages Forwarding Mechanism
2011, 11 (
5
): 0-0.
Abstract
(
142
)
PDF
(557KB) (
111
)
NULL
Related Articles
|
Metrics
Select
Password-based Technology Platform Android Digital Media Copyright Management System
2011, 11 (
5
): 0-0.
Abstract
(
111
)
PDF
(599KB) (
112
)
NULL
Related Articles
|
Metrics
Select
The Basic Principle of Public Key Cryptosystems
2011, 11 (
5
): 0-0.
Abstract
(
139
)
PDF
(310KB) (
318
)
NULL
Related Articles
|
Metrics
Select
Password Equipment Application Technology Development Research
2011, 11 (
5
): 0-0.
Abstract
(
127
)
PDF
(165KB) (
256
)
NULL
Related Articles
|
Metrics
Select
Encryption Devices Use Management Research
2011, 11 (
5
): 0-0.
Abstract
(
146
)
PDF
(443KB) (
72
)
NULL
Related Articles
|
Metrics
Select
Use Password Technology Protection Digital Works Legal Inquiry
2011, 11 (
5
): 0-0.
Abstract
(
147
)
PDF
(257KB) (
127
)
NULL
Related Articles
|
Metrics
Select
Smart Phones Prevent Leak Strategy Research
2011, 11 (
5
): 0-0.
Abstract
(
226
)
PDF
(393KB) (
149
)
NULL
Related Articles
|
Metrics
Select
AES Encryption Algorithm Analysis and the Application in Information Security
2011, 11 (
5
): 0-0.
Abstract
(
205
)
PDF
(241KB) (
497
)
NULL
Related Articles
|
Metrics
Select
C2 Password Prevent Attack Technology Research
2011, 11 (
5
): 0-0.
Abstract
(
143
)
PDF
(221KB) (
62
)
NULL
Related Articles
|
Metrics
Select
The Secure Authentication of Network Secure Transmission Platform
2011, 11 (
5
): 0-0.
Abstract
(
166
)
PDF
(458KB) (
121
)
NULL
Related Articles
|
Metrics
Select
Shallow Re-debate the Password Techniques in the Field of Information Security in the Current Application
2011, 11 (
5
): 0-0.
Abstract
(
112
)
PDF
(381KB) (
122
)
NULL
Related Articles
|
Metrics
Select
The Research of an Improved Algorithm of Pseudo-random Numbers
2011, 11 (
5
): 0-0.
Abstract
(
140
)
PDF
(561KB) (
81
)
NULL
Related Articles
|
Metrics
Select
A Study on Mobile Phone Network Crime in the New Period
2011, 11 (
5
): 0-0.
Abstract
(
186
)
PDF
(331KB) (
157
)
NULL
Related Articles
|
Metrics
Select
Application Research of the Encryption Technology in Distributed System
2011, 11 (
5
): 0-0.
Abstract
(
131
)
PDF
(388KB) (
76
)
NULL
Related Articles
|
Metrics
Select
Research on Monitoring Method of Encrypting Network Communication Data
2011, 11 (
5
): 0-0.
Abstract
(
181
)
PDF
(496KB) (
137
)
NULL
Related Articles
|
Metrics
Select
Research in an Authorization Management Model Based on Access Control List
2011, 11 (
5
): 0-0.
Abstract
(
97
)
PDF
(645KB) (
165
)
NULL
Related Articles
|
Metrics
Select
Research on a Novel Key Management Scheme for 3G Network End-To-End Encryption
2011, 11 (
5
): 0-0.
Abstract
(
151
)
PDF
(489KB) (
190
)
NULL
Related Articles
|
Metrics
Select
Research on Homomorphic Encryption Technology and the Applications of it in IOT
2011, 11 (
5
): 0-0.
Abstract
(
219
)
PDF
(328KB) (
410
)
NULL
Related Articles
|
Metrics
Select
Research On the Notice Rule for the Tort Liability of ISP and Improvement for it
2011, 11 (
5
): 0-0.
Abstract
(
229
)
PDF
(404KB) (
62
)
NULL
Related Articles
|
Metrics
Select
Using Virtual Phone Implementation Fraud Crime of Case Analysis
2011, 11 (
5
): 0-0.
Abstract
(
112
)
PDF
(416KB) (
148
)
NULL
Related Articles
|
Metrics
Select
Research on the Balance between Communication Sharing and Copyrights Protection Boundry
2011, 11 (
5
): 0-0.
Abstract
(
137
)
PDF
(396KB) (
126
)
NULL
Related Articles
|
Metrics
Select
Revelation and Countermeasures of China Information and Network Security from WikiLeaks Event
2011, 11 (
5
): 0-0.
Abstract
(
141
)
PDF
(522KB) (
310
)
NULL
Related Articles
|
Metrics
Select
On Techniques of Personal Meta Search Engine of Uyghur Websites Based on Google Web API
2011, 11 (
5
): 0-0.
Abstract
(
154
)
PDF
(325KB) (
100
)
NULL
Related Articles
|
Metrics
Select
Study on the Recovery Technology of DOS Boot Recorder on FAT32 File System
2011, 11 (
5
): 0-0.
Abstract
(
195
)
PDF
(530KB) (
505
)
NULL
Related Articles
|
Metrics
Select
The Development of Security System of Smartphone
2011, 11 (
5
): 0-0.
Abstract
(
142
)
PDF
(275KB) (
93
)
NULL
Related Articles
|
Metrics
Select
Research Topic Maps Based Knowledge System of the Public Security Case Information Resource
2011, 11 (
5
): 0-0.
Abstract
(
142
)
PDF
(240KB) (
93
)
NULL
Related Articles
|
Metrics
Select
Text Opinion Classification Technique for Intelligence Systems of Public Security
2011, 11 (
5
): 0-0.
Abstract
(
135
)
PDF
(606KB) (
282
)
NULL
Related Articles
|
Metrics
Select
Research on Secure Exchange System of Spatial Data for E-Government
2011, 11 (
5
): 0-0.
Abstract
(
107
)
PDF
(333KB) (
122
)
NULL
Related Articles
|
Metrics
Select
Computer Virus Analysis of 2011 April
2011, 11 (
5
): 0-0.
Abstract
(
138
)
PDF
(208KB) (
100
)
NULL
Related Articles
|
Metrics
Select
Ten Critical Vulnerabilities Analysis Report April 2011
2011, 11 (
5
): 0-0.
Abstract
(
138
)
PDF
(538KB) (
58
)
NULL
Related Articles
|
Metrics
Select
Network Security Monitoring Data Analysis Report of 2011 March
2011, 11 (
5
): 0-0.
Abstract
(
87
)
PDF
(490KB) (
76
)
NULL
Related Articles
|
Metrics