Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 August 2011, Volume 11 Issue 8
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Thinking on Theoretic Cryptography and Modern Cryptography
2011, 11 (
8
): 0-0.
Abstract
(
383
)
PDF
(334KB) (
673
)
NULL
Related Articles
|
Metrics
Select
The Analysis of Actuality and Development of Third Party Payment
2011, 11 (
8
): 0-0.
Abstract
(
164
)
PDF
(340KB) (
449
)
NULL
Related Articles
|
Metrics
Select
Study of the Reliability of Dynamo System
2011, 11 (
8
): 0-0.
Abstract
(
195
)
PDF
(1067KB) (
215
)
NULL
Related Articles
|
Metrics
Select
Facebook Cassandra Architecture and Design Analysis of Credibility
2011, 11 (
8
): 0-0.
Abstract
(
127
)
PDF
(491KB) (
164
)
NULL
Related Articles
|
Metrics
Select
Credibility Analysis of Amazon Architecture
2011, 11 (
8
): 0-0.
Abstract
(
166
)
PDF
(450KB) (
144
)
NULL
Related Articles
|
Metrics
Select
Study on the Credibility of Micro-blog System Architecture
2011, 11 (
8
): 0-0.
Abstract
(
97
)
PDF
(479KB) (
120
)
NULL
Related Articles
|
Metrics
Select
The Transport Security Mechanism in Access Point Product with 802.1X (EAP-TLS) Standard
2011, 11 (
8
): 0-0.
Abstract
(
117
)
PDF
(402KB) (
126
)
NULL
Related Articles
|
Metrics
Select
Image Encryption Algorithm Based on MD5 Algorithm and Logistic Map
2011, 11 (
8
): 0-0.
Abstract
(
112
)
PDF
(381KB) (
182
)
NULL
Related Articles
|
Metrics
Select
Application of Pornography Image Detection
2011, 11 (
8
): 0-0.
Abstract
(
389
)
PDF
(156KB) (
250
)
NULL
Related Articles
|
Metrics
Select
Security of KEELOQ Encryption Algorithm
2011, 11 (
8
): 0-0.
Abstract
(
107
)
PDF
(237KB) (
424
)
NULL
Related Articles
|
Metrics
Select
The Judicial Analysis of Decoding and Saling Data after Illegal Access to Computer
2011, 11 (
8
): 0-0.
Abstract
(
165
)
PDF
(357KB) (
64
)
NULL
Related Articles
|
Metrics
Select
Important Role of Electron Evidence in Criminal Cases
2011, 11 (
8
): 0-0.
Abstract
(
145
)
PDF
(170KB) (
182
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of "Small File" Forensics Software in NTFS System
2011, 11 (
8
): 0-0.
Abstract
(
148
)
PDF
(505KB) (
169
)
NULL
Related Articles
|
Metrics
Select
Research and Usage of Admission Control for Network
2011, 11 (
8
): 0-0.
Abstract
(
176
)
PDF
(240KB) (
296
)
NULL
Related Articles
|
Metrics
Select
The Research of PKI in the Application of Cloud Computing
2011, 11 (
8
): 0-0.
Abstract
(
185
)
PDF
(476KB) (
128
)
NULL
Related Articles
|
Metrics
Select
Research of Audio Watermarking Based on Biometrics Identification Technology
2011, 11 (
8
): 0-0.
Abstract
(
137
)
PDF
(478KB) (
136
)
NULL
Related Articles
|
Metrics
Select
The Research of Cloud Computing in the Application of Electronic Data Obtain Evidence
2011, 11 (
8
): 0-0.
Abstract
(
210
)
PDF
(505KB) (
377
)
NULL
Related Articles
|
Metrics
Select
The Analysis System of Risk Assessment Base on VPRS and Group Decision Making
2011, 11 (
8
): 0-0.
Abstract
(
178
)
PDF
(291KB) (
211
)
NULL
Related Articles
|
Metrics
Select
Security Problems in Three Networks Convergence and Their Solutions
2011, 11 (
8
): 0-0.
Abstract
(
180
)
PDF
(420KB) (
200
)
NULL
Related Articles
|
Metrics
Select
3G Network Security Analysis and Research
2011, 11 (
8
): 0-0.
Abstract
(
168
)
PDF
(159KB) (
180
)
NULL
Related Articles
|
Metrics
Select
Network Instant Communication System Management
2011, 11 (
8
): 0-0.
Abstract
(
249
)
PDF
(389KB) (
390
)
NULL
Related Articles
|
Metrics
Select
Armed Police Force Cable Integrated Communication Network Information Security Research
2011, 11 (
8
): 0-0.
Abstract
(
179
)
PDF
(169KB) (
75
)
NULL
Related Articles
|
Metrics
Select
Analysis and Improvement of a Typical Web Security Assessment Tool
2011, 11 (
8
): 0-0.
Abstract
(
231
)
PDF
(321KB) (
187
)
NULL
Related Articles
|
Metrics
Select
The Application of Recommendation System and Research on its Security
2011, 11 (
8
): 0-0.
Abstract
(
196
)
PDF
(256KB) (
167
)
NULL
Related Articles
|
Metrics
Select
Vulnerability-based Model Checking of Security Vulnerabilities Mining Method
2011, 11 (
8
): 0-0.
Abstract
(
283
)
PDF
(465KB) (
410
)
NULL
Related Articles
|
Metrics
Select
Research on Security Emergency Response System Based on Telecom Operation
2011, 11 (
8
): 0-0.
Abstract
(
281
)
PDF
(511KB) (
180
)
NULL
Related Articles
|
Metrics
Select
Study of the System Architecture of Cloud Security
2011, 11 (
8
): 0-0.
Abstract
(
215
)
PDF
(262KB) (
294
)
NULL
Related Articles
|
Metrics
Select
Research on A Method of Detecting Puppet Process
2011, 11 (
8
): 0-0.
Abstract
(
168
)
PDF
(314KB) (
380
)
NULL
Related Articles
|
Metrics
Select
The Research of the Jurisdiction on Computer Economic Crime
2011, 11 (
8
): 0-0.
Abstract
(
136
)
PDF
(411KB) (
97
)
NULL
Related Articles
|
Metrics
Select
Europe and the United States Network Telephone Monitoring Analysis of the Legal Regulation
2011, 11 (
8
): 0-0.
Abstract
(
164
)
PDF
(509KB) (
241
)
NULL
Related Articles
|
Metrics
Select
The Impact of Cloud Computing on Tools for Software Assessment
2011, 11 (
8
): 0-0.
Abstract
(
156
)
PDF
(165KB) (
134
)
NULL
Related Articles
|
Metrics
Select
Information Security Products Analysis Report of 2011
2011, 11 (
8
): 0-0.
Abstract
(
135
)
PDF
(375KB) (
189
)
NULL
Related Articles
|
Metrics
Select
Computer Virus Analysis of 2011 July
2011, 11 (
8
): 0-0.
Abstract
(
173
)
PDF
(229KB) (
267
)
NULL
Related Articles
|
Metrics
Select
Network Security Monitoring Data Analysis Report of 2011 June
2011, 11 (
8
): 0-0.
Abstract
(
142
)
PDF
(313KB) (
151
)
NULL
Related Articles
|
Metrics
Select
Ten Critical Vulnerabilities Analysis Report July 2011
2011, 11 (
8
): 0-0.
Abstract
(
156
)
PDF
(169KB) (
92
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
8
): 0-0.
Abstract
(
164
)
PDF
(227KB) (
81
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
8
): 0-0.
Abstract
(
97
)
PDF
(974KB) (
80
)
NULL
Related Articles
|
Metrics