-
1
-
2“... on, can provide more security services and the Internet To prevent crime on the Internet, the individual...”
Get full text
Others -
3“... the current 64-bit to 128-bit expansion, is a different IPv6 has a built-in IP security , transmission network...”
Get full text
Others -
4“... environment, the network security can be guaranteed. Malicious attacker often use this section of insecure...”
Get full text
Others -
5“...In mobile ad hoc networks (MANETs), the more applications we use, the more security is required...”
Get full text
Article -
6“..., the awareness of information security have raised because enterprises are highly dependant on information...”
Get full text
Others -
7“... network (WLAN). However, the WLAN has security risk. In order to protect attacker from arbitrary use...”
Get full text
Others -
8“...碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 97 === Wireless Network Communication has been a popular...”
Get full text
Others -
9“... on information technology. In the meantime, with the increase of information leakage and information security...”
Get full text
Others -
10“... the data via the Internet, it needs to meet such requirements as integrity, security and privacy, etc...”
Get full text
Others -
11“... of telecommunication services, they simultaneously consider the invisible threat in mobile networks. In order...”
Get full text
Others -
12“... in computation power, and suffer from security threats. In order to provide the safe and efficient environment...”
Get full text
Others -
13“...碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 97 === The communication model that computer network provides...”
Get full text
Others -
14“..., cryptography and security have matured, leading to the development of improved network security...”
Get full text
Others -
15“.... The early stage of computer viruses has gradually changed to the form of network worms. Through fast...”
Get full text
Others -
16“.... The vehicular ad-hoc network (VANET) is a novel wireless network, and suffers the security threats as other...”
Get full text
Others -
17“..., therefore, the new generation access control usually use role as base framework. The access control security...”
Get full text
Others -
18“... networking, a new type in E-Commerce, group buying, is flourishing. Group buying is carried out on attendants...”
Get full text
Others -
19“... firewall as the core of network security management. They would set up common firewall rules to satisfy...”
Get full text
Others -
20“...碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 99 === With maturity of the network infrastructure technology...”
Get full text
Others