Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 451399 results
Sort by: relevance publication year

The research of network security technologies

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Zhen Wang, Zhijie Liu, Xiaoyao Xie

The Research of Bluetooth Wireless Communication Network in NC System

Conference Paper published Apr 2009 in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing

Authors: Kunqi Wang, Peng Wang, Yanan Wang

Research on Evaluation Technology of Communication Network Management System

Conference Paper published May 2009 in 2009 International Conference on E-Business and Information System Security

Authors: Zhongqiao Zheng, Yanhong Zhang

Impact of Security on QoS in Communication Network

Conference Paper published Apr 2009 in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing

Authors: Jianyong Chen, Cunying Hu, Huawang Zeng, Jun Zhang

Routing-Based Global Network Communication Quality Representation for Event-driven Wireless Sensor Network

Conference Paper published 2009 in 2009 Second International Symposium on Electronic Commerce and Security

Authors: Zhenhua Wu, Jian Shu

Rational Protocols

Chapter published 2009 in IFIP Advances in Information and Communication Technology on pages 93 to 94

Authors: Christian Cachin

iNetSec 2009 – Open Research Problems in Network Security

Book published 2009 in IFIP Advances in Information and Communication Technology

Editors: Jan Camenisch, Dogan Kesdogan

A Hierarchical Model for Cross-Domain Communication of Health Care Units

Conference Paper published 2009 in 2009 Third International Conference on Network and System Security

Authors: Dimitris Geneiatakis, Costas Lambrinoudakis, Stefanos Gritzalis

Application of primary components analysis of security threat in wireless network

Conference Paper published Aug 2009 in 2009 ISECS International Colloquium on Computing, Communication, Control, and Management

Authors: Qu Zhiming, Wang Jingmei

Application of grey relation in analyzing network security events

Conference Paper published Aug 2009 in 2009 ISECS International Colloquium on Computing, Communication, Control, and Management

Authors: Qu Zhiming, Wang Xiaoli

A logic-based approach to network security risk assessment

Conference Paper published Aug 2009 in 2009 ISECS International Colloquium on Computing, Communication, Control, and Management

Authors: Yi Ji, Danyan Wen, Haiquan Wang, Chunhe Xia

Intermediate Frequency design of Broadband Wireless Adhoc Network system

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Mingxian Li, Lingyu Chen, Jianghong Shi

An Improved Short Message Security Protocol for Home Network

Conference Paper published Jun 2009 in 2009 ETP International Conference on Future Computer and Communication

Authors: Liu Pu

Neural network based decryption for random encryption algorithms

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Rathi Kannan Munukur, Vignesh Gnanam

Anonymous Communication in Wireless Mesh Network

Conference Paper published 2009 in 2009 International Conference on Computational Intelligence and Security

Authors: Ru Li, Liaojun Pang, Qingqi Pei, Guozhen Xiao

The Research of Hybrid Network Communication System in NC System

Conference Paper published Apr 2009 in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing

Authors: Kun-qi Wang, Peng Wang, Ya-nan Wang

Research on Information Security in Modern Network

Conference Paper published Apr 2009 in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing

Authors: Ning Zhang, Hong Bao

Research of Security Mobile Payment Protocol in Communication Restrictions Scenarios

Conference Paper published 2009 in 2009 International Conference on Computational Intelligence and Security

Authors: Xueming Wang, Nan Cui

Research of the electronic commerce information security technology

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Xing Chen

New Directions in RFID Security

Chapter published 2009 in IFIP Advances in Information and Communication Technology on pages 76 to 84

Authors: Erik-Oliver Blass, Refik Molva