Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 August 2011, Volume 11 Issue 8
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Thinking on Theoretic Cryptography and Modern Cryptography
2011, 11 (
8
): 0-0.
Abstract
(
254
)
PDF
(334KB) (
523
)
NULL
Related Articles
|
Metrics
Select
The Analysis of Actuality and Development of Third Party Payment
2011, 11 (
8
): 0-0.
Abstract
(
109
)
PDF
(340KB) (
374
)
NULL
Related Articles
|
Metrics
Select
Study of the Reliability of Dynamo System
2011, 11 (
8
): 0-0.
Abstract
(
155
)
PDF
(1067KB) (
158
)
NULL
Related Articles
|
Metrics
Select
Facebook Cassandra Architecture and Design Analysis of Credibility
2011, 11 (
8
): 0-0.
Abstract
(
101
)
PDF
(491KB) (
106
)
NULL
Related Articles
|
Metrics
Select
Credibility Analysis of Amazon Architecture
2011, 11 (
8
): 0-0.
Abstract
(
133
)
PDF
(450KB) (
114
)
NULL
Related Articles
|
Metrics
Select
Study on the Credibility of Micro-blog System Architecture
2011, 11 (
8
): 0-0.
Abstract
(
59
)
PDF
(479KB) (
99
)
NULL
Related Articles
|
Metrics
Select
The Transport Security Mechanism in Access Point Product with 802.1X (EAP-TLS) Standard
2011, 11 (
8
): 0-0.
Abstract
(
96
)
PDF
(402KB) (
75
)
NULL
Related Articles
|
Metrics
Select
Image Encryption Algorithm Based on MD5 Algorithm and Logistic Map
2011, 11 (
8
): 0-0.
Abstract
(
94
)
PDF
(381KB) (
135
)
NULL
Related Articles
|
Metrics
Select
Application of Pornography Image Detection
2011, 11 (
8
): 0-0.
Abstract
(
282
)
PDF
(156KB) (
208
)
NULL
Related Articles
|
Metrics
Select
Security of KEELOQ Encryption Algorithm
2011, 11 (
8
): 0-0.
Abstract
(
61
)
PDF
(237KB) (
303
)
NULL
Related Articles
|
Metrics
Select
The Judicial Analysis of Decoding and Saling Data after Illegal Access to Computer
2011, 11 (
8
): 0-0.
Abstract
(
149
)
PDF
(357KB) (
52
)
NULL
Related Articles
|
Metrics
Select
Important Role of Electron Evidence in Criminal Cases
2011, 11 (
8
): 0-0.
Abstract
(
116
)
PDF
(170KB) (
117
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of "Small File" Forensics Software in NTFS System
2011, 11 (
8
): 0-0.
Abstract
(
110
)
PDF
(505KB) (
108
)
NULL
Related Articles
|
Metrics
Select
Research and Usage of Admission Control for Network
2011, 11 (
8
): 0-0.
Abstract
(
136
)
PDF
(240KB) (
191
)
NULL
Related Articles
|
Metrics
Select
The Research of PKI in the Application of Cloud Computing
2011, 11 (
8
): 0-0.
Abstract
(
113
)
PDF
(476KB) (
117
)
NULL
Related Articles
|
Metrics
Select
Research of Audio Watermarking Based on Biometrics Identification Technology
2011, 11 (
8
): 0-0.
Abstract
(
109
)
PDF
(478KB) (
118
)
NULL
Related Articles
|
Metrics
Select
The Research of Cloud Computing in the Application of Electronic Data Obtain Evidence
2011, 11 (
8
): 0-0.
Abstract
(
170
)
PDF
(505KB) (
239
)
NULL
Related Articles
|
Metrics
Select
The Analysis System of Risk Assessment Base on VPRS and Group Decision Making
2011, 11 (
8
): 0-0.
Abstract
(
148
)
PDF
(291KB) (
174
)
NULL
Related Articles
|
Metrics
Select
Security Problems in Three Networks Convergence and Their Solutions
2011, 11 (
8
): 0-0.
Abstract
(
131
)
PDF
(420KB) (
144
)
NULL
Related Articles
|
Metrics
Select
3G Network Security Analysis and Research
2011, 11 (
8
): 0-0.
Abstract
(
144
)
PDF
(159KB) (
169
)
NULL
Related Articles
|
Metrics
Select
Network Instant Communication System Management
2011, 11 (
8
): 0-0.
Abstract
(
174
)
PDF
(389KB) (
258
)
NULL
Related Articles
|
Metrics
Select
Armed Police Force Cable Integrated Communication Network Information Security Research
2011, 11 (
8
): 0-0.
Abstract
(
120
)
PDF
(169KB) (
57
)
NULL
Related Articles
|
Metrics
Select
Analysis and Improvement of a Typical Web Security Assessment Tool
2011, 11 (
8
): 0-0.
Abstract
(
195
)
PDF
(321KB) (
117
)
NULL
Related Articles
|
Metrics
Select
The Application of Recommendation System and Research on its Security
2011, 11 (
8
): 0-0.
Abstract
(
163
)
PDF
(256KB) (
108
)
NULL
Related Articles
|
Metrics
Select
Vulnerability-based Model Checking of Security Vulnerabilities Mining Method
2011, 11 (
8
): 0-0.
Abstract
(
199
)
PDF
(465KB) (
333
)
NULL
Related Articles
|
Metrics
Select
Research on Security Emergency Response System Based on Telecom Operation
2011, 11 (
8
): 0-0.
Abstract
(
183
)
PDF
(511KB) (
119
)
NULL
Related Articles
|
Metrics
Select
Study of the System Architecture of Cloud Security
2011, 11 (
8
): 0-0.
Abstract
(
160
)
PDF
(262KB) (
264
)
NULL
Related Articles
|
Metrics
Select
Research on A Method of Detecting Puppet Process
2011, 11 (
8
): 0-0.
Abstract
(
137
)
PDF
(314KB) (
317
)
NULL
Related Articles
|
Metrics
Select
The Research of the Jurisdiction on Computer Economic Crime
2011, 11 (
8
): 0-0.
Abstract
(
104
)
PDF
(411KB) (
84
)
NULL
Related Articles
|
Metrics
Select
Europe and the United States Network Telephone Monitoring Analysis of the Legal Regulation
2011, 11 (
8
): 0-0.
Abstract
(
113
)
PDF
(509KB) (
123
)
NULL
Related Articles
|
Metrics
Select
The Impact of Cloud Computing on Tools for Software Assessment
2011, 11 (
8
): 0-0.
Abstract
(
130
)
PDF
(165KB) (
103
)
NULL
Related Articles
|
Metrics
Select
Information Security Products Analysis Report of 2011
2011, 11 (
8
): 0-0.
Abstract
(
110
)
PDF
(375KB) (
100
)
NULL
Related Articles
|
Metrics
Select
Computer Virus Analysis of 2011 July
2011, 11 (
8
): 0-0.
Abstract
(
136
)
PDF
(229KB) (
192
)
NULL
Related Articles
|
Metrics
Select
Network Security Monitoring Data Analysis Report of 2011 June
2011, 11 (
8
): 0-0.
Abstract
(
99
)
PDF
(313KB) (
128
)
NULL
Related Articles
|
Metrics
Select
Ten Critical Vulnerabilities Analysis Report July 2011
2011, 11 (
8
): 0-0.
Abstract
(
108
)
PDF
(169KB) (
79
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
8
): 0-0.
Abstract
(
112
)
PDF
(227KB) (
68
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
8
): 0-0.
Abstract
(
69
)
PDF
(974KB) (
64
)
NULL
Related Articles
|
Metrics