Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 August 2013, Volume 13 Issue 8
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
275
)
PDF
(5952KB) (
234
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
137
)
PDF
(842KB) (
58
)
NULL
Related Articles
|
Metrics
Select
Research on Software Security Requirement Analysis based on Information Classiifed Security Protection
2013, 13 (
8
): 0-0.
Abstract
(
173
)
PDF
(1179KB) (
169
)
NULL
Related Articles
|
Metrics
Select
Research of Key Technologies on Classiifed Information System’s Interconnection
2013, 13 (
8
): 0-0.
Abstract
(
162
)
PDF
(1159KB) (
854
)
classiifed information system%interconnection%information exchange
Related Articles
|
Metrics
Select
Design and Implementation of Collecting and Restoring System for Electronic Evidence
2013, 13 (
8
): 0-0.
Abstract
(
219
)
PDF
(1347KB) (
192
)
electronic evidence%computer forensics%collecting%restoring
Related Articles
|
Metrics
Select
A Duplicate Data Detection Algorithm based on Extremum Deifned Chunking
2013, 13 (
8
): 0-0.
Abstract
(
120
)
PDF
(1185KB) (
158
)
duplicated data detection%content deifned chunking%extremum deifned chunking%ifngerprint
Related Articles
|
Metrics
Select
The Implementation and Evaluation of SM2 Algorithm in Java
2013, 13 (
8
): 0-0.
Abstract
(
309
)
PDF
(1449KB) (
827
)
SM2 cryptosystem%elliptic curve%algorithm test
Related Articles
|
Metrics
Select
Design and Research of Communication Encryption Scheme based on the Symmetric Cryptography
2013, 13 (
8
): 0-0.
Abstract
(
138
)
PDF
(1238KB) (
181
)
symmetric cryptography%communication encryption%block cipher%stream cipher
Related Articles
|
Metrics
Select
Authority Separation of User Account in Social Login Privacy Protection Platform
2013, 13 (
8
): 0-0.
Abstract
(
89
)
PDF
(1187KB) (
123
)
social networking site%third-party website%authority separation of user account%privacy protection
Related Articles
|
Metrics
Select
Research on the Application of Visual Cryptography in Interactive Authentication
2013, 13 (
8
): 0-0.
Abstract
(
135
)
PDF
(1140KB) (
170
)
challenge-response%visual password%interactive authentication
Related Articles
|
Metrics
Select
The Design and Implementation of the System for Application Rate Control in Android
2013, 13 (
8
): 0-0.
Abstract
(
194
)
PDF
(1170KB) (
571
)
Android application rate control%Linux%netiflter\iptables%QoS%Android ifrewall
Related Articles
|
Metrics
Select
System Architecture and Pattern Research of Vaadin based on RIA
2013, 13 (
8
): 0-0.
Abstract
(
196
)
PDF
(1173KB) (
464
)
rich Internet application%no plug-ins%server-side architecture
Related Articles
|
Metrics
Select
Investigation and Analysis of LAN Equipment Clues
2013, 13 (
8
): 0-0.
Abstract
(
173
)
PDF
(1199KB) (
151
)
LAN(local area network)%clue analysis%switch%router%wireless router
Related Articles
|
Metrics
Select
Analysis and Countermeasure Research on Phishing Crime based on SSL Protocol
2013, 13 (
8
): 0-0.
Abstract
(
170
)
PDF
(1148KB) (
147
)
SSL Protocol%phishing%countermeasure
Related Articles
|
Metrics
Select
The Practice of the Network Security Deployment based on the Private Cloud Security Platform
2013, 13 (
8
): 0-0.
Abstract
(
164
)
PDF
(1169KB) (
177
)
cloud security system%cloud security platform%private cloud security platform
Related Articles
|
Metrics
Select
UMTS Network Security Research
2013, 13 (
8
): 0-0.
Abstract
(
177
)
PDF
(1066KB) (
58
)
UMTS%GSM%network security
Related Articles
|
Metrics
Select
The Fraud Risk and Security Countermeasures about cyber-banking
2013, 13 (
8
): 0-0.
Abstract
(
165
)
PDF
(1097KB) (
164
)
cyber-banking%fraud risk%means of attack%security countermeasures
Related Articles
|
Metrics
Select
The Analysis of Data Transmission Scheme between GPRS Network and Internet
2013, 13 (
8
): 0-0.
Abstract
(
177
)
PDF
(1146KB) (
320
)
General Packet Radio Service%Point-to-Point Protocol%GPRS module settings
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
122
)
PDF
(966KB) (
83
)
NULL
Related Articles
|
Metrics
Select
Research on Model Construction of Large-scale Image Detection
2013, 13 (
8
): 0-0.
Abstract
(
175
)
PDF
(1152KB) (
215
)
image detection%large-scale operation%big data%large system
Related Articles
|
Metrics
Select
HFS+Deleted File Recovery Technology
2013, 13 (
8
): 0-0.
Abstract
(
380
)
PDF
(1239KB) (
265
)
data recovery%HFS+ifle system%journal%B-tree%index node%leaf node
Related Articles
|
Metrics
Select
TheMethodofDecryptingEFSOflfineandItsApplicationsinForensics
2013, 13 (
8
): 0-0.
Abstract
(
238
)
PDF
(1184KB) (
912
)
encrypting ifle system%encrypt%forensics
Related Articles
|
Metrics
Select
Forensic Analysis about Hacking into the Website
2013, 13 (
8
): 0-0.
Abstract
(
175
)
PDF
(1094KB) (
367
)
website intrusion%IIS log analysis%forensic analysis
Related Articles
|
Metrics
Select
Acquisition and Analysis of Electronic Evidence in the Case of Network Marketing
2013, 13 (
8
): 0-0.
Abstract
(
195
)
PDF
(1146KB) (
320
)
network marketing%investigation%prevention and combat
Related Articles
|
Metrics
Select
Study on the Application of Virtual Technology in Electronic Data Veriifcation and Identiifcation Laboratory
2013, 13 (
8
): 0-0.
Abstract
(
152
)
PDF
(1126KB) (
101
)
virtualization%electronic data%identiifcation%laboratory
Related Articles
|
Metrics
Select
Research on Professional Electronic Equipment Forensics Technology
2013, 13 (
8
): 0-0.
Abstract
(
155
)
PDF
(1117KB) (
339
)
professional electronic equipent forensics%electronic data%information storage
Related Articles
|
Metrics
Select
The Difference between Security and Safety
2013, 13 (
8
): 0-0.
Abstract
(
300
)
PDF
(1122KB) (
503
)
information security%network security%security evaluation%risk management%evaluation indicator
Related Articles
|
Metrics
Select
Research of Digital Forensics under Cloud Computing Environment
2013, 13 (
8
): 0-0.
Abstract
(
204
)
PDF
(1122KB) (
193
)
cloud computing%electronic forensics%cyber-crime%cloud forensics
Related Articles
|
Metrics
Select
Research on Value of Big Data in Smart Campus
2013, 13 (
8
): 0-0.
Abstract
(
177
)
PDF
(1125KB) (
1371
)
big data%smart campus%Internet of Things%cloud computing
Related Articles
|
Metrics
Select
Research on Judicial Practice of the Electronic Evidence
2013, 13 (
8
): 0-0.
Abstract
(
162
)
PDF
(1101KB) (
165
)
electronic evidence%legal status%judicial practice
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
170
)
PDF
(884KB) (
103
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
196
)
PDF
(880KB) (
185
)
NULL
Related Articles
|
Metrics