Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 514813 results
Sort by: relevance publication year

The Network Security Issue of 3G Mobile Communication System Research

Conference Paper published 2010 in 2010 International Conference on Machine Vision and Human-machine Interface

Authors: Wenqiong Yu

SECURITY ANALYSIS OF TCP/IP NETWORKS - An Approach to Automatic Analysis of Network Security Properties

Conference Paper published 2010 in Proceedings of the International Conference on Data Communication Networking and Optical Communication Systems

Design and Analysis of Stream Cipher for Network Security

Conference Paper published 2010 in 2010 Second International Conference on Communication Software and Networks

Authors: Chhattar Singh Lamba

The analysis and realization of the P2P network security

Conference Paper published 2010 in 2010 2nd International Conference on Future Computer and Communication

Authors: Guoxiaoli, Zhaozhiming, Guoping

Deploying virtualization technology for verification of a network security

Conference Paper published Oct 2010 in 2010 4th International Conference on Application of Information and Communication Technologies

Authors: Evgeny Abramov, Oleg Makarevich

UMARAM: A novel fast encryption algorithm for data security in local area network

Conference Paper published Oct 2010 in 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES

Authors: G. Ramesh, R. Umarani

A backbone communication network security situation prediction method

Conference Paper published Dec 2010 in The 2nd International Conference on Information Science and Engineering

Authors: Liu Yonghu, Zhouyingjie, Hu Guangmin

WiMAX-WiFi unified network architecture, security, and mobility

Conference Paper published Nov 2010 in 2010 IEEE 12th International Conference on Communication Technology

Authors: Leo. Yi, Kai X. Miao

Capability Simulating Model for Complex Communication Network

Conference Paper published Dec 2010 in 2010 International Conference on Computational Intelligence and Security

Authors: Wang Yu, Xu Feng

Continuum-State Communication Network Reliability Model

Conference Paper published 2010 in 2010 International Conference on Multimedia Information Networking and Security

Authors: Yu Jiang, Aiqun Hu, Yubo Song

A Review of Some Security Aspects of WiMAX and Converged Network

Conference Paper published 2010 in 2010 Second International Conference on Communication Software and Networks

Authors: Masood Habib, Masood Ahmad

Research on the network security of a E-commerce system based on logistics information platform

Conference Paper published Jun 2010 in 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering

Authors: Geng di, Li xiangming, Liu haibin

eBATMAN: An Emulator-BAsed Testbed for Studying Mobile Ad-Hoc Network Security

Conference Paper published Nov 2010 in 2010 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF)

Authors: Trung Nguyen, Hoai-Nam Nguyen, Yoichi Shinoda

Research about solution for network security based on security domain

Conference Paper published Jun 2010 in 2010 International Conference On Computer Design and Applications

Authors: Yan Hui, Han Weijie, Wang Yu

Research on Wireless Sensor Network Security

Conference Paper published Dec 2010 in 2010 International Conference on Computational Intelligence and Security

Authors: Yan-Xiao Li, Lian Qin, Qian Liang

Network security and management

Conference Paper published Dec 2010 in 2010 IEEE International Conference on Computational Intelligence and Computing Research

Authors: Brijendra Singh

The Security Issues of Scientific-Workflow Technique in Network Grid Computing

Conference Paper published Apr 2010 in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics

Authors: Feng Wang, Hui Deng, Wei Dai, Sheng Zheng, Bo Liang

Ignorant Experts: Computer and Network Security Support from Internet Service Providers

Conference Paper published Sep 2010 in 2010 Fourth International Conference on Network and System Security

Authors: Patryk Szewczyk, Craig Valli

Risk Evaluation of Network Security Based on NLPCA-RBF Neural Network

Conference Paper published 2010 in 2010 International Conference on Multimedia Information Networking and Security

Authors: Jingxue Ran, Bo Xiao

Network Security fixes WordPress configuration hole

Journal Article published Apr 2010 in Network Security volume 2010 issue 4 on page 20