Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 August 2013, Volume 13 Issue 8
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
261
)
PDF
(5952KB) (
220
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
130
)
PDF
(842KB) (
48
)
NULL
Related Articles
|
Metrics
Select
Research on Software Security Requirement Analysis based on Information Classiifed Security Protection
2013, 13 (
8
): 0-0.
Abstract
(
160
)
PDF
(1179KB) (
156
)
NULL
Related Articles
|
Metrics
Select
Research of Key Technologies on Classiifed Information System’s Interconnection
2013, 13 (
8
): 0-0.
Abstract
(
153
)
PDF
(1159KB) (
808
)
classiifed information system%interconnection%information exchange
Related Articles
|
Metrics
Select
Design and Implementation of Collecting and Restoring System for Electronic Evidence
2013, 13 (
8
): 0-0.
Abstract
(
203
)
PDF
(1347KB) (
171
)
electronic evidence%computer forensics%collecting%restoring
Related Articles
|
Metrics
Select
A Duplicate Data Detection Algorithm based on Extremum Deifned Chunking
2013, 13 (
8
): 0-0.
Abstract
(
108
)
PDF
(1185KB) (
144
)
duplicated data detection%content deifned chunking%extremum deifned chunking%ifngerprint
Related Articles
|
Metrics
Select
The Implementation and Evaluation of SM2 Algorithm in Java
2013, 13 (
8
): 0-0.
Abstract
(
284
)
PDF
(1449KB) (
641
)
SM2 cryptosystem%elliptic curve%algorithm test
Related Articles
|
Metrics
Select
Design and Research of Communication Encryption Scheme based on the Symmetric Cryptography
2013, 13 (
8
): 0-0.
Abstract
(
126
)
PDF
(1238KB) (
143
)
symmetric cryptography%communication encryption%block cipher%stream cipher
Related Articles
|
Metrics
Select
Authority Separation of User Account in Social Login Privacy Protection Platform
2013, 13 (
8
): 0-0.
Abstract
(
79
)
PDF
(1187KB) (
115
)
social networking site%third-party website%authority separation of user account%privacy protection
Related Articles
|
Metrics
Select
Research on the Application of Visual Cryptography in Interactive Authentication
2013, 13 (
8
): 0-0.
Abstract
(
127
)
PDF
(1140KB) (
138
)
challenge-response%visual password%interactive authentication
Related Articles
|
Metrics
Select
The Design and Implementation of the System for Application Rate Control in Android
2013, 13 (
8
): 0-0.
Abstract
(
186
)
PDF
(1170KB) (
505
)
Android application rate control%Linux%netiflter\iptables%QoS%Android ifrewall
Related Articles
|
Metrics
Select
System Architecture and Pattern Research of Vaadin based on RIA
2013, 13 (
8
): 0-0.
Abstract
(
189
)
PDF
(1173KB) (
423
)
rich Internet application%no plug-ins%server-side architecture
Related Articles
|
Metrics
Select
Investigation and Analysis of LAN Equipment Clues
2013, 13 (
8
): 0-0.
Abstract
(
166
)
PDF
(1199KB) (
138
)
LAN(local area network)%clue analysis%switch%router%wireless router
Related Articles
|
Metrics
Select
Analysis and Countermeasure Research on Phishing Crime based on SSL Protocol
2013, 13 (
8
): 0-0.
Abstract
(
165
)
PDF
(1148KB) (
139
)
SSL Protocol%phishing%countermeasure
Related Articles
|
Metrics
Select
The Practice of the Network Security Deployment based on the Private Cloud Security Platform
2013, 13 (
8
): 0-0.
Abstract
(
156
)
PDF
(1169KB) (
165
)
cloud security system%cloud security platform%private cloud security platform
Related Articles
|
Metrics
Select
UMTS Network Security Research
2013, 13 (
8
): 0-0.
Abstract
(
171
)
PDF
(1066KB) (
50
)
UMTS%GSM%network security
Related Articles
|
Metrics
Select
The Fraud Risk and Security Countermeasures about cyber-banking
2013, 13 (
8
): 0-0.
Abstract
(
160
)
PDF
(1097KB) (
157
)
cyber-banking%fraud risk%means of attack%security countermeasures
Related Articles
|
Metrics
Select
The Analysis of Data Transmission Scheme between GPRS Network and Internet
2013, 13 (
8
): 0-0.
Abstract
(
170
)
PDF
(1146KB) (
313
)
General Packet Radio Service%Point-to-Point Protocol%GPRS module settings
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
117
)
PDF
(966KB) (
71
)
NULL
Related Articles
|
Metrics
Select
Research on Model Construction of Large-scale Image Detection
2013, 13 (
8
): 0-0.
Abstract
(
168
)
PDF
(1152KB) (
198
)
image detection%large-scale operation%big data%large system
Related Articles
|
Metrics
Select
HFS+Deleted File Recovery Technology
2013, 13 (
8
): 0-0.
Abstract
(
369
)
PDF
(1239KB) (
239
)
data recovery%HFS+ifle system%journal%B-tree%index node%leaf node
Related Articles
|
Metrics
Select
TheMethodofDecryptingEFSOflfineandItsApplicationsinForensics
2013, 13 (
8
): 0-0.
Abstract
(
231
)
PDF
(1184KB) (
869
)
encrypting ifle system%encrypt%forensics
Related Articles
|
Metrics
Select
Forensic Analysis about Hacking into the Website
2013, 13 (
8
): 0-0.
Abstract
(
169
)
PDF
(1094KB) (
341
)
website intrusion%IIS log analysis%forensic analysis
Related Articles
|
Metrics
Select
Acquisition and Analysis of Electronic Evidence in the Case of Network Marketing
2013, 13 (
8
): 0-0.
Abstract
(
191
)
PDF
(1146KB) (
297
)
network marketing%investigation%prevention and combat
Related Articles
|
Metrics
Select
Study on the Application of Virtual Technology in Electronic Data Veriifcation and Identiifcation Laboratory
2013, 13 (
8
): 0-0.
Abstract
(
143
)
PDF
(1126KB) (
85
)
virtualization%electronic data%identiifcation%laboratory
Related Articles
|
Metrics
Select
Research on Professional Electronic Equipment Forensics Technology
2013, 13 (
8
): 0-0.
Abstract
(
148
)
PDF
(1117KB) (
312
)
professional electronic equipent forensics%electronic data%information storage
Related Articles
|
Metrics
Select
The Difference between Security and Safety
2013, 13 (
8
): 0-0.
Abstract
(
287
)
PDF
(1122KB) (
436
)
information security%network security%security evaluation%risk management%evaluation indicator
Related Articles
|
Metrics
Select
Research of Digital Forensics under Cloud Computing Environment
2013, 13 (
8
): 0-0.
Abstract
(
193
)
PDF
(1122KB) (
153
)
cloud computing%electronic forensics%cyber-crime%cloud forensics
Related Articles
|
Metrics
Select
Research on Value of Big Data in Smart Campus
2013, 13 (
8
): 0-0.
Abstract
(
165
)
PDF
(1125KB) (
1308
)
big data%smart campus%Internet of Things%cloud computing
Related Articles
|
Metrics
Select
Research on Judicial Practice of the Electronic Evidence
2013, 13 (
8
): 0-0.
Abstract
(
159
)
PDF
(1101KB) (
148
)
electronic evidence%legal status%judicial practice
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
161
)
PDF
(884KB) (
96
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
8
): 0-0.
Abstract
(
186
)
PDF
(880KB) (
167
)
NULL
Related Articles
|
Metrics