Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 June 2011, Volume 11 Issue 5
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2011, 11 (
5
): 0-0.
Abstract
(
243
)
PDF
(1421KB) (
64
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
5
): 0-0.
Abstract
(
135
)
PDF
(207KB) (
38
)
NULL
Related Articles
|
Metrics
Select
Anti-cryptography Quantum Computing Research(continued)
2011, 11 (
5
): 0-0.
Abstract
(
196
)
PDF
(329KB) (
352
)
NULL
Related Articles
|
Metrics
Select
Design, Implementation and Case Study for a Terra Based DRM Platform
2011, 11 (
5
): 0-0.
Abstract
(
134
)
PDF
(300KB) (
90
)
NULL
Related Articles
|
Metrics
Select
The Research of Security Authentication Protocol Based On Application Layer of TCP/IP
2011, 11 (
5
): 0-0.
Abstract
(
165
)
PDF
(210KB) (
120
)
NULL
Related Articles
|
Metrics
Select
Analysis and Realization of a Convert Short Messages Forwarding Mechanism
2011, 11 (
5
): 0-0.
Abstract
(
130
)
PDF
(557KB) (
98
)
NULL
Related Articles
|
Metrics
Select
Password-based Technology Platform Android Digital Media Copyright Management System
2011, 11 (
5
): 0-0.
Abstract
(
97
)
PDF
(599KB) (
109
)
NULL
Related Articles
|
Metrics
Select
The Basic Principle of Public Key Cryptosystems
2011, 11 (
5
): 0-0.
Abstract
(
123
)
PDF
(310KB) (
273
)
NULL
Related Articles
|
Metrics
Select
Password Equipment Application Technology Development Research
2011, 11 (
5
): 0-0.
Abstract
(
111
)
PDF
(165KB) (
213
)
NULL
Related Articles
|
Metrics
Select
Encryption Devices Use Management Research
2011, 11 (
5
): 0-0.
Abstract
(
136
)
PDF
(443KB) (
69
)
NULL
Related Articles
|
Metrics
Select
Use Password Technology Protection Digital Works Legal Inquiry
2011, 11 (
5
): 0-0.
Abstract
(
133
)
PDF
(257KB) (
118
)
NULL
Related Articles
|
Metrics
Select
Smart Phones Prevent Leak Strategy Research
2011, 11 (
5
): 0-0.
Abstract
(
212
)
PDF
(393KB) (
124
)
NULL
Related Articles
|
Metrics
Select
AES Encryption Algorithm Analysis and the Application in Information Security
2011, 11 (
5
): 0-0.
Abstract
(
183
)
PDF
(241KB) (
456
)
NULL
Related Articles
|
Metrics
Select
C2 Password Prevent Attack Technology Research
2011, 11 (
5
): 0-0.
Abstract
(
136
)
PDF
(221KB) (
60
)
NULL
Related Articles
|
Metrics
Select
The Secure Authentication of Network Secure Transmission Platform
2011, 11 (
5
): 0-0.
Abstract
(
155
)
PDF
(458KB) (
106
)
NULL
Related Articles
|
Metrics
Select
Shallow Re-debate the Password Techniques in the Field of Information Security in the Current Application
2011, 11 (
5
): 0-0.
Abstract
(
102
)
PDF
(381KB) (
100
)
NULL
Related Articles
|
Metrics
Select
The Research of an Improved Algorithm of Pseudo-random Numbers
2011, 11 (
5
): 0-0.
Abstract
(
123
)
PDF
(561KB) (
78
)
NULL
Related Articles
|
Metrics
Select
A Study on Mobile Phone Network Crime in the New Period
2011, 11 (
5
): 0-0.
Abstract
(
163
)
PDF
(331KB) (
150
)
NULL
Related Articles
|
Metrics
Select
Application Research of the Encryption Technology in Distributed System
2011, 11 (
5
): 0-0.
Abstract
(
111
)
PDF
(388KB) (
74
)
NULL
Related Articles
|
Metrics
Select
Research on Monitoring Method of Encrypting Network Communication Data
2011, 11 (
5
): 0-0.
Abstract
(
165
)
PDF
(496KB) (
102
)
NULL
Related Articles
|
Metrics
Select
Research in an Authorization Management Model Based on Access Control List
2011, 11 (
5
): 0-0.
Abstract
(
84
)
PDF
(645KB) (
161
)
NULL
Related Articles
|
Metrics
Select
Research on a Novel Key Management Scheme for 3G Network End-To-End Encryption
2011, 11 (
5
): 0-0.
Abstract
(
139
)
PDF
(489KB) (
157
)
NULL
Related Articles
|
Metrics
Select
Research on Homomorphic Encryption Technology and the Applications of it in IOT
2011, 11 (
5
): 0-0.
Abstract
(
212
)
PDF
(328KB) (
373
)
NULL
Related Articles
|
Metrics
Select
Research On the Notice Rule for the Tort Liability of ISP and Improvement for it
2011, 11 (
5
): 0-0.
Abstract
(
222
)
PDF
(404KB) (
58
)
NULL
Related Articles
|
Metrics
Select
Using Virtual Phone Implementation Fraud Crime of Case Analysis
2011, 11 (
5
): 0-0.
Abstract
(
97
)
PDF
(416KB) (
144
)
NULL
Related Articles
|
Metrics
Select
Research on the Balance between Communication Sharing and Copyrights Protection Boundry
2011, 11 (
5
): 0-0.
Abstract
(
129
)
PDF
(396KB) (
113
)
NULL
Related Articles
|
Metrics
Select
Revelation and Countermeasures of China Information and Network Security from WikiLeaks Event
2011, 11 (
5
): 0-0.
Abstract
(
135
)
PDF
(522KB) (
281
)
NULL
Related Articles
|
Metrics
Select
On Techniques of Personal Meta Search Engine of Uyghur Websites Based on Google Web API
2011, 11 (
5
): 0-0.
Abstract
(
142
)
PDF
(325KB) (
89
)
NULL
Related Articles
|
Metrics
Select
Study on the Recovery Technology of DOS Boot Recorder on FAT32 File System
2011, 11 (
5
): 0-0.
Abstract
(
186
)
PDF
(530KB) (
487
)
NULL
Related Articles
|
Metrics
Select
The Development of Security System of Smartphone
2011, 11 (
5
): 0-0.
Abstract
(
131
)
PDF
(275KB) (
83
)
NULL
Related Articles
|
Metrics
Select
Research Topic Maps Based Knowledge System of the Public Security Case Information Resource
2011, 11 (
5
): 0-0.
Abstract
(
125
)
PDF
(240KB) (
85
)
NULL
Related Articles
|
Metrics
Select
Text Opinion Classification Technique for Intelligence Systems of Public Security
2011, 11 (
5
): 0-0.
Abstract
(
130
)
PDF
(606KB) (
168
)
NULL
Related Articles
|
Metrics
Select
Research on Secure Exchange System of Spatial Data for E-Government
2011, 11 (
5
): 0-0.
Abstract
(
100
)
PDF
(333KB) (
112
)
NULL
Related Articles
|
Metrics
Select
Computer Virus Analysis of 2011 April
2011, 11 (
5
): 0-0.
Abstract
(
121
)
PDF
(208KB) (
92
)
NULL
Related Articles
|
Metrics
Select
Ten Critical Vulnerabilities Analysis Report April 2011
2011, 11 (
5
): 0-0.
Abstract
(
129
)
PDF
(538KB) (
54
)
NULL
Related Articles
|
Metrics
Select
Network Security Monitoring Data Analysis Report of 2011 March
2011, 11 (
5
): 0-0.
Abstract
(
80
)
PDF
(490KB) (
74
)
NULL
Related Articles
|
Metrics