Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 643985 results
Sort by: relevance publication year

The application research of Cookies in network security

Conference Paper published May 2013 in PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System

Authors: Bo Li, Shen-juan Lv, Yong-sheng Zhang, Ming Tian

Research on Network Security Collaborative Early-Warning Based on Multi-agent

Conference Paper published Sep 2013 in 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control

Authors: Chen Junhua

Author index

Conference Paper published May 2013 in PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System

[Front matter]

Conference Paper published May 2013 in PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System

Organizing committee

Conference Paper published May 2013 in PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System

Importance of Cryptography in Network Security

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: T. R. Devi

The Research and Application of Network Security Technology in the University Network

Conference Paper published 2013 in Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation

Authors: Ling Jia

The research and design of embed RSA encryption algorithm network encryption card driver

Conference Paper published May 2013 in PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System

Authors: Jingyang Gao, Hai Cheng, Ziheng Yang, Qun Ding

High speed classification of vulnerabilities in cloud computing using collaborative network security management

Conference Paper published Dec 2013 in 2013 International Conference on Advanced Computing and Communication Systems

Authors: L. Krishnakumar, Nisha Mariam Varughese

Improvisation of Security Aspect in Steganography Applying DES

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: M. K. Ramaiya, N. Hemrajani, A. K. Saxena

Design of Security Neighbor Discovery Protocol

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: Hua Chun Liu, Qing Guang Dai

Management System Discussion of Electronic Commerce Security

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: Yaojun Yan, Shuning Li

Enhancing Security by Averaging Multiple Fingerprint Images

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: M. Singh, S. Ayub, R. Verma

Security Architecture for MANET and Its Application in M-Governance

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: B. Kaur

Embedded Systems -- A Security Paradigm for Pervasive Computing

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: S. Sharma

Advanced Security Algorithm for Power Grid

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: G. Gangil, R. Narvey

A study of network security using penetration testing

Conference Paper published Feb 2013 in 2013 International Conference on Information Communication and Embedded Systems (ICICES)

Authors: R. Shanmugapriya

Table of contents

Conference Paper published May 2013 in PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System

Effective VTP Model for Enterprise VLAN Security

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: R. O. Verma, S. S. Shriramwar

The research and design of identity authentication based on speech feature

Conference Paper published May 2013 in PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System

Authors: Hongbin Ma, Shuang Yan, Xue Bai, Yong Zhu