Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 March 2013, Volume 13 Issue 3
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
3
): 0-0.
Abstract
(
266
)
PDF
(71KB) (
179
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
3
): 0-0.
Abstract
(
118
)
PDF
(1034KB) (
188
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
3
): 0-0.
Abstract
(
112
)
PDF
(1032KB) (
131
)
NULL
Related Articles
|
Metrics
Select
Failure Detection Algorithm based on Wavelet Transform and Combinational Models for Cloud Computing
2013, 13 (
3
): 0-0.
Abstract
(
142
)
PDF
(1171KB) (
66
)
NULL
Related Articles
|
Metrics
Select
Research on Authentication in the Cloud Connectivity of Wireless Sensor Networks
2013, 13 (
3
): 0-0.
Abstract
(
111
)
PDF
(670KB) (
178
)
NULL
Related Articles
|
Metrics
Select
Analysis on Computer Forensic by Using the Structure of Microsoft Compound Document
2013, 13 (
3
): 0-0.
Abstract
(
196
)
PDF
(1096KB) (
100
)
NULL
Related Articles
|
Metrics
Select
The Encrypted Database Statistical Method based on Homomorphism Encryption
2013, 13 (
3
): 0-0.
Abstract
(
160
)
PDF
(266KB) (
295
)
NULL
Related Articles
|
Metrics
Select
A Routing Protocol based on Random Linear Network Coding for Opportunistic Network
2013, 13 (
3
): 0-0.
Abstract
(
176
)
PDF
(1281KB) (
300
)
NULL
Related Articles
|
Metrics
Select
Research and Implementations on Large-scale Distributed Honeynet
2013, 13 (
3
): 0-0.
Abstract
(
176
)
PDF
(1726KB) (
215
)
NULL
Related Articles
|
Metrics
Select
Plaintext Recovery Attack on REESSE1+ Public Key Cryptosystem
2013, 13 (
3
): 0-0.
Abstract
(
120
)
PDF
(655KB) (
137
)
NULL
Related Articles
|
Metrics
Select
A New Type of Encryption Algorithm Which is based on Euler Loop Sequence
2013, 13 (
3
): 0-0.
Abstract
(
240
)
PDF
(1702KB) (
187
)
NULL
Related Articles
|
Metrics
Select
Research on Hash Function Collision Attack and Defense Strategy of SSL Protocol
2013, 13 (
3
): 0-0.
Abstract
(
218
)
PDF
(1128KB) (
144
)
NULL
Related Articles
|
Metrics
Select
Data Security Mechanism based on RSA Digital Envelope in Android System
2013, 13 (
3
): 0-0.
Abstract
(
189
)
PDF
(1092KB) (
879
)
NULL
Related Articles
|
Metrics
Select
The Confidential Transmission System based on the Physical Layer Characteristics of Wireless Channel
2013, 13 (
3
): 0-0.
Abstract
(
130
)
PDF
(2139KB) (
501
)
NULL
Related Articles
|
Metrics
Select
Excel Macro Virus Analysis and Prevention
2013, 13 (
3
): 0-0.
Abstract
(
150
)
PDF
(843KB) (
1074
)
NULL
Related Articles
|
Metrics
Select
SunDisk-Removable Storage Devices Protection System based Windows
2013, 13 (
3
): 0-0.
Abstract
(
248
)
PDF
(1697KB) (
62
)
NULL
Related Articles
|
Metrics
Select
Application and Countermeasure of Anonymous Communication Network in Psychological & Public Opinion Warfare
2013, 13 (
3
): 0-0.
Abstract
(
118
)
PDF
(1099KB) (
265
)
NULL
Related Articles
|
Metrics
Select
APT Threat Detection and Protection of Integrated Network Space
2013, 13 (
3
): 0-0.
Abstract
(
287
)
PDF
(673KB) (
348
)
NULL
Related Articles
|
Metrics
Select
Design and Implentment of Secure Access Gateway of the Internet of Things based on FPGA
2013, 13 (
3
): 0-0.
Abstract
(
247
)
PDF
(1095KB) (
190
)
NULL
Related Articles
|
Metrics
Select
Based on IBM Mobile Agent LAN Information Acquisition and Preprocessor
2013, 13 (
3
): 0-0.
Abstract
(
137
)
PDF
(743KB) (
105
)
NULL
Related Articles
|
Metrics
Select
Study on OAuth Protocol Security
2013, 13 (
3
): 0-0.
Abstract
(
147
)
PDF
(663KB) (
268
)
NULL
Related Articles
|
Metrics
Select
Security Detection and Forensics Analysis System on Android
2013, 13 (
3
): 0-0.
Abstract
(
395
)
PDF
(1628KB) (
277
)
NULL
Related Articles
|
Metrics
Select
Design and Implementation of the anti-Keyboard and Mouse Recorder
2013, 13 (
3
): 0-0.
Abstract
(
180
)
PDF
(1632KB) (
191
)
NULL
Related Articles
|
Metrics
Select
Design and Realization of Digital Certificate Initialization and Unlocking System
2013, 13 (
3
): 0-0.
Abstract
(
326
)
PDF
(192KB) (
171
)
NULL
Related Articles
|
Metrics
Select
Sensitive Information Input Safety Technology
2013, 13 (
3
): 0-0.
Abstract
(
151
)
PDF
(2070KB) (
78
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
3
): 0-0.
Abstract
(
113
)
PDF
(292KB) (
88
)
NULL
Related Articles
|
Metrics
Select
The Risk Control Mechanism of the Cloud Computing IT Outsourcing
2013, 13 (
3
): 0-0.
Abstract
(
98
)
PDF
(1603KB) (
90
)
NULL
Related Articles
|
Metrics
Select
In Some Countries the Work of CERT Overview and Enlightenment
2013, 13 (
3
): 0-0.
Abstract
(
225
)
PDF
(328KB) (
911
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
3
): 0-0.
Abstract
(
111
)
PDF
(517KB) (
52
)
NULL
Related Articles
|
Metrics