Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 August 2011, Volume 11 Issue 8
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Thinking on Theoretic Cryptography and Modern Cryptography
2011, 11 (
8
): 0-0.
Abstract
(
290
)
PDF
(334KB) (
571
)
NULL
Related Articles
|
Metrics
Select
The Analysis of Actuality and Development of Third Party Payment
2011, 11 (
8
): 0-0.
Abstract
(
126
)
PDF
(340KB) (
395
)
NULL
Related Articles
|
Metrics
Select
Study of the Reliability of Dynamo System
2011, 11 (
8
): 0-0.
Abstract
(
160
)
PDF
(1067KB) (
175
)
NULL
Related Articles
|
Metrics
Select
Facebook Cassandra Architecture and Design Analysis of Credibility
2011, 11 (
8
): 0-0.
Abstract
(
106
)
PDF
(491KB) (
127
)
NULL
Related Articles
|
Metrics
Select
Credibility Analysis of Amazon Architecture
2011, 11 (
8
): 0-0.
Abstract
(
137
)
PDF
(450KB) (
136
)
NULL
Related Articles
|
Metrics
Select
Study on the Credibility of Micro-blog System Architecture
2011, 11 (
8
): 0-0.
Abstract
(
64
)
PDF
(479KB) (
106
)
NULL
Related Articles
|
Metrics
Select
The Transport Security Mechanism in Access Point Product with 802.1X (EAP-TLS) Standard
2011, 11 (
8
): 0-0.
Abstract
(
102
)
PDF
(402KB) (
87
)
NULL
Related Articles
|
Metrics
Select
Image Encryption Algorithm Based on MD5 Algorithm and Logistic Map
2011, 11 (
8
): 0-0.
Abstract
(
97
)
PDF
(381KB) (
150
)
NULL
Related Articles
|
Metrics
Select
Application of Pornography Image Detection
2011, 11 (
8
): 0-0.
Abstract
(
309
)
PDF
(156KB) (
226
)
NULL
Related Articles
|
Metrics
Select
Security of KEELOQ Encryption Algorithm
2011, 11 (
8
): 0-0.
Abstract
(
69
)
PDF
(237KB) (
348
)
NULL
Related Articles
|
Metrics
Select
The Judicial Analysis of Decoding and Saling Data after Illegal Access to Computer
2011, 11 (
8
): 0-0.
Abstract
(
154
)
PDF
(357KB) (
57
)
NULL
Related Articles
|
Metrics
Select
Important Role of Electron Evidence in Criminal Cases
2011, 11 (
8
): 0-0.
Abstract
(
125
)
PDF
(170KB) (
131
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of "Small File" Forensics Software in NTFS System
2011, 11 (
8
): 0-0.
Abstract
(
117
)
PDF
(505KB) (
136
)
NULL
Related Articles
|
Metrics
Select
Research and Usage of Admission Control for Network
2011, 11 (
8
): 0-0.
Abstract
(
146
)
PDF
(240KB) (
230
)
NULL
Related Articles
|
Metrics
Select
The Research of PKI in the Application of Cloud Computing
2011, 11 (
8
): 0-0.
Abstract
(
122
)
PDF
(476KB) (
121
)
NULL
Related Articles
|
Metrics
Select
Research of Audio Watermarking Based on Biometrics Identification Technology
2011, 11 (
8
): 0-0.
Abstract
(
112
)
PDF
(478KB) (
126
)
NULL
Related Articles
|
Metrics
Select
The Research of Cloud Computing in the Application of Electronic Data Obtain Evidence
2011, 11 (
8
): 0-0.
Abstract
(
187
)
PDF
(505KB) (
355
)
NULL
Related Articles
|
Metrics
Select
The Analysis System of Risk Assessment Base on VPRS and Group Decision Making
2011, 11 (
8
): 0-0.
Abstract
(
157
)
PDF
(291KB) (
191
)
NULL
Related Articles
|
Metrics
Select
Security Problems in Three Networks Convergence and Their Solutions
2011, 11 (
8
): 0-0.
Abstract
(
139
)
PDF
(420KB) (
163
)
NULL
Related Articles
|
Metrics
Select
3G Network Security Analysis and Research
2011, 11 (
8
): 0-0.
Abstract
(
149
)
PDF
(159KB) (
173
)
NULL
Related Articles
|
Metrics
Select
Network Instant Communication System Management
2011, 11 (
8
): 0-0.
Abstract
(
187
)
PDF
(389KB) (
324
)
NULL
Related Articles
|
Metrics
Select
Armed Police Force Cable Integrated Communication Network Information Security Research
2011, 11 (
8
): 0-0.
Abstract
(
131
)
PDF
(169KB) (
68
)
NULL
Related Articles
|
Metrics
Select
Analysis and Improvement of a Typical Web Security Assessment Tool
2011, 11 (
8
): 0-0.
Abstract
(
206
)
PDF
(321KB) (
132
)
NULL
Related Articles
|
Metrics
Select
The Application of Recommendation System and Research on its Security
2011, 11 (
8
): 0-0.
Abstract
(
169
)
PDF
(256KB) (
130
)
NULL
Related Articles
|
Metrics
Select
Vulnerability-based Model Checking of Security Vulnerabilities Mining Method
2011, 11 (
8
): 0-0.
Abstract
(
206
)
PDF
(465KB) (
364
)
NULL
Related Articles
|
Metrics
Select
Research on Security Emergency Response System Based on Telecom Operation
2011, 11 (
8
): 0-0.
Abstract
(
207
)
PDF
(511KB) (
148
)
NULL
Related Articles
|
Metrics
Select
Study of the System Architecture of Cloud Security
2011, 11 (
8
): 0-0.
Abstract
(
167
)
PDF
(262KB) (
284
)
NULL
Related Articles
|
Metrics
Select
Research on A Method of Detecting Puppet Process
2011, 11 (
8
): 0-0.
Abstract
(
142
)
PDF
(314KB) (
340
)
NULL
Related Articles
|
Metrics
Select
The Research of the Jurisdiction on Computer Economic Crime
2011, 11 (
8
): 0-0.
Abstract
(
112
)
PDF
(411KB) (
89
)
NULL
Related Articles
|
Metrics
Select
Europe and the United States Network Telephone Monitoring Analysis of the Legal Regulation
2011, 11 (
8
): 0-0.
Abstract
(
126
)
PDF
(509KB) (
178
)
NULL
Related Articles
|
Metrics
Select
The Impact of Cloud Computing on Tools for Software Assessment
2011, 11 (
8
): 0-0.
Abstract
(
135
)
PDF
(165KB) (
113
)
NULL
Related Articles
|
Metrics
Select
Information Security Products Analysis Report of 2011
2011, 11 (
8
): 0-0.
Abstract
(
122
)
PDF
(375KB) (
140
)
NULL
Related Articles
|
Metrics
Select
Computer Virus Analysis of 2011 July
2011, 11 (
8
): 0-0.
Abstract
(
142
)
PDF
(229KB) (
205
)
NULL
Related Articles
|
Metrics
Select
Network Security Monitoring Data Analysis Report of 2011 June
2011, 11 (
8
): 0-0.
Abstract
(
110
)
PDF
(313KB) (
134
)
NULL
Related Articles
|
Metrics
Select
Ten Critical Vulnerabilities Analysis Report July 2011
2011, 11 (
8
): 0-0.
Abstract
(
120
)
PDF
(169KB) (
84
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
8
): 0-0.
Abstract
(
120
)
PDF
(227KB) (
73
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
8
): 0-0.
Abstract
(
79
)
PDF
(974KB) (
71
)
NULL
Related Articles
|
Metrics