Funding Data Link References Status API Help
Page 1 of 157 results
Sort by: relevance publication year

The research of network security technologies

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Zhen Wang, Zhijie Liu, Xiaoyao Xie

Neural network based decryption for random encryption algorithms

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Rathi Kannan Munukur, Vignesh Gnanam

Research of the electronic commerce information security technology

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Xing Chen

Using non-deterministic finite automaton to research intrusion tolerant system

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Cuicui Zhang, Xiaoyao Xie

Research of Space Station Data System structure design

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Xin Wang

A research on a defending policy against the Webcrawler's attack

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Wei Tong, Xiaoyao Xie

Band adaptive modulation pattern recognition method research

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Shuxia Guo, Ying Gao

A virtualization-based network architecture for next generation internet

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Depeng Jin, Yong Li, Ye Zhou, Li Su, Lieguang Zeng

Design for wireless sensor network-based intelligent public transportation system

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Lang Peng, Fen Xiao, Zurong Ni

The network safety design of the telecom comprehensive operations management system based on VPN

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Nan Wu, Tao Wu

Intermediate Frequency design of Broadband Wireless Adhoc Network system

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Mingxian Li, Lingyu Chen, Jianghong Shi

Optimized routing design for wireless mesh networks based on neural network

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Bo Liu, Jianling Gao, Xiaoyao Xie

Modeling of gauge predictive control system in hot rolling mill based on BP network

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Jianrui Zhang, Shengbo Hu

Electromagnetic interference on the transmission line in the industrial monitoring and control network

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Yanbin Li, YunXiang Lu

Performance analysis of rate adaptation in cognitive wireless network over fading channel

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Lianfen Huang, Dan Guo, Yan Yao

Organizing committee

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

IBE technology applying to the information security of RFID tags

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Xian Zhang, Danning Li

Visual security is feeble for anti-phishing

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Chun-Ming Leung

Authorization model for multilevel security workflow based on RTBAC

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Lei Wang, Xiaoyao Xie

Co-sponsor

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication