Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 August 2013, Volume 13 Issue 8
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
328
)
PDF
(5952KB) (
256
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
149
)
PDF
(842KB) (
64
)
NULL
Related Articles
|
Metrics
Select
Research on Software Security Requirement Analysis based on Information Classiifed Security Protection
2013, 13 (
8
): 0-0.
Abstract
(
210
)
PDF
(1179KB) (
183
)
NULL
Related Articles
|
Metrics
Select
Research of Key Technologies on Classiifed Information System’s Interconnection
2013, 13 (
8
): 0-0.
Abstract
(
193
)
PDF
(1159KB) (
954
)
classiifed information system%interconnection%information exchange
Related Articles
|
Metrics
Select
Design and Implementation of Collecting and Restoring System for Electronic Evidence
2013, 13 (
8
): 0-0.
Abstract
(
267
)
PDF
(1347KB) (
213
)
electronic evidence%computer forensics%collecting%restoring
Related Articles
|
Metrics
Select
A Duplicate Data Detection Algorithm based on Extremum Deifned Chunking
2013, 13 (
8
): 0-0.
Abstract
(
180
)
PDF
(1185KB) (
167
)
duplicated data detection%content deifned chunking%extremum deifned chunking%ifngerprint
Related Articles
|
Metrics
Select
The Implementation and Evaluation of SM2 Algorithm in Java
2013, 13 (
8
): 0-0.
Abstract
(
399
)
PDF
(1449KB) (
1023
)
SM2 cryptosystem%elliptic curve%algorithm test
Related Articles
|
Metrics
Select
Design and Research of Communication Encryption Scheme based on the Symmetric Cryptography
2013, 13 (
8
): 0-0.
Abstract
(
189
)
PDF
(1238KB) (
237
)
symmetric cryptography%communication encryption%block cipher%stream cipher
Related Articles
|
Metrics
Select
Authority Separation of User Account in Social Login Privacy Protection Platform
2013, 13 (
8
): 0-0.
Abstract
(
112
)
PDF
(1187KB) (
129
)
social networking site%third-party website%authority separation of user account%privacy protection
Related Articles
|
Metrics
Select
Research on the Application of Visual Cryptography in Interactive Authentication
2013, 13 (
8
): 0-0.
Abstract
(
152
)
PDF
(1140KB) (
209
)
challenge-response%visual password%interactive authentication
Related Articles
|
Metrics
Select
The Design and Implementation of the System for Application Rate Control in Android
2013, 13 (
8
): 0-0.
Abstract
(
223
)
PDF
(1170KB) (
689
)
Android application rate control%Linux%netiflter\iptables%QoS%Android ifrewall
Related Articles
|
Metrics
Select
System Architecture and Pattern Research of Vaadin based on RIA
2013, 13 (
8
): 0-0.
Abstract
(
224
)
PDF
(1173KB) (
495
)
rich Internet application%no plug-ins%server-side architecture
Related Articles
|
Metrics
Select
Investigation and Analysis of LAN Equipment Clues
2013, 13 (
8
): 0-0.
Abstract
(
208
)
PDF
(1199KB) (
166
)
LAN(local area network)%clue analysis%switch%router%wireless router
Related Articles
|
Metrics
Select
Analysis and Countermeasure Research on Phishing Crime based on SSL Protocol
2013, 13 (
8
): 0-0.
Abstract
(
209
)
PDF
(1148KB) (
154
)
SSL Protocol%phishing%countermeasure
Related Articles
|
Metrics
Select
The Practice of the Network Security Deployment based on the Private Cloud Security Platform
2013, 13 (
8
): 0-0.
Abstract
(
193
)
PDF
(1169KB) (
188
)
cloud security system%cloud security platform%private cloud security platform
Related Articles
|
Metrics
Select
UMTS Network Security Research
2013, 13 (
8
): 0-0.
Abstract
(
225
)
PDF
(1066KB) (
64
)
UMTS%GSM%network security
Related Articles
|
Metrics
Select
The Fraud Risk and Security Countermeasures about cyber-banking
2013, 13 (
8
): 0-0.
Abstract
(
176
)
PDF
(1097KB) (
173
)
cyber-banking%fraud risk%means of attack%security countermeasures
Related Articles
|
Metrics
Select
The Analysis of Data Transmission Scheme between GPRS Network and Internet
2013, 13 (
8
): 0-0.
Abstract
(
220
)
PDF
(1146KB) (
337
)
General Packet Radio Service%Point-to-Point Protocol%GPRS module settings
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
135
)
PDF
(966KB) (
98
)
NULL
Related Articles
|
Metrics
Select
Research on Model Construction of Large-scale Image Detection
2013, 13 (
8
): 0-0.
Abstract
(
198
)
PDF
(1152KB) (
239
)
image detection%large-scale operation%big data%large system
Related Articles
|
Metrics
Select
HFS+Deleted File Recovery Technology
2013, 13 (
8
): 0-0.
Abstract
(
421
)
PDF
(1239KB) (
320
)
data recovery%HFS+ifle system%journal%B-tree%index node%leaf node
Related Articles
|
Metrics
Select
TheMethodofDecryptingEFSOflfineandItsApplicationsinForensics
2013, 13 (
8
): 0-0.
Abstract
(
251
)
PDF
(1184KB) (
1035
)
encrypting ifle system%encrypt%forensics
Related Articles
|
Metrics
Select
Forensic Analysis about Hacking into the Website
2013, 13 (
8
): 0-0.
Abstract
(
228
)
PDF
(1094KB) (
399
)
website intrusion%IIS log analysis%forensic analysis
Related Articles
|
Metrics
Select
Acquisition and Analysis of Electronic Evidence in the Case of Network Marketing
2013, 13 (
8
): 0-0.
Abstract
(
241
)
PDF
(1146KB) (
342
)
network marketing%investigation%prevention and combat
Related Articles
|
Metrics
Select
Study on the Application of Virtual Technology in Electronic Data Veriifcation and Identiifcation Laboratory
2013, 13 (
8
): 0-0.
Abstract
(
221
)
PDF
(1126KB) (
113
)
virtualization%electronic data%identiifcation%laboratory
Related Articles
|
Metrics
Select
Research on Professional Electronic Equipment Forensics Technology
2013, 13 (
8
): 0-0.
Abstract
(
193
)
PDF
(1117KB) (
371
)
professional electronic equipent forensics%electronic data%information storage
Related Articles
|
Metrics
Select
The Difference between Security and Safety
2013, 13 (
8
): 0-0.
Abstract
(
334
)
PDF
(1122KB) (
566
)
information security%network security%security evaluation%risk management%evaluation indicator
Related Articles
|
Metrics
Select
Research of Digital Forensics under Cloud Computing Environment
2013, 13 (
8
): 0-0.
Abstract
(
237
)
PDF
(1122KB) (
257
)
cloud computing%electronic forensics%cyber-crime%cloud forensics
Related Articles
|
Metrics
Select
Research on Value of Big Data in Smart Campus
2013, 13 (
8
): 0-0.
Abstract
(
220
)
PDF
(1125KB) (
1446
)
big data%smart campus%Internet of Things%cloud computing
Related Articles
|
Metrics
Select
Research on Judicial Practice of the Electronic Evidence
2013, 13 (
8
): 0-0.
Abstract
(
172
)
PDF
(1101KB) (
171
)
electronic evidence%legal status%judicial practice
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
197
)
PDF
(884KB) (
116
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
212
)
PDF
(880KB) (
193
)
NULL
Related Articles
|
Metrics