Showing 1 - 20 results of 28 for search 'NETWORK SECURITY', query time: 0.72s Refine Results
  1. 1
  2. 2
    by Li-kang Tu, 屠立剛
    Published 2008
    ... on, can provide more security services and the Internet To prevent crime on the Internet, the individual...
    Get full text
    Others
  3. 3
    by Shih-Fu Pi, 畢仕福
    Published 2009
    ... the current 64-bit to 128-bit expansion, is a different IPv6 has a built-in IP security , transmission network...
    Get full text
    Others
  4. 4
    by Hao-Lun Lee, 李皓倫
    Published 2012
    ... environment, the network security can be guaranteed. Malicious attacker often use this section of insecure...
    Get full text
    Others
  5. 5
    by Wei-Chen Wu, Horng-Twu Liaw
    Published 2015-01-01
    ...In mobile ad hoc networks (MANETs), the more applications we use, the more security is required...
    Get full text
    Article
  6. 6
    by Hung-Bin Chiu, 瞿鴻斌
    Published 2005
    ..., the awareness of information security have raised because enterprises are highly dependant on information...
    Get full text
    Others
  7. 7
    by Ya-Wen Cheng, 鄭雅文
    Published 2009
    ... network (WLAN). However, the WLAN has security risk. In order to protect attacker from arbitrary use...
    Get full text
    Others
  8. 8
    by Feng-Yi Su, 蘇峰毅
    Published 2009
    ...碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 97 === Wireless Network Communication has been a popular...
    Get full text
    Others
  9. 9
    by Sheng-Hsiung Tsen, 曾聖雄
    Published 2012
    ... on information technology. In the meantime, with the increase of information leakage and information security...
    Get full text
    Others
  10. 10
    by Yun-Kun Chuang, 莊耘坤
    Published 2008
    ... the data via the Internet, it needs to meet such requirements as integrity, security and privacy, etc...
    Get full text
    Others
  11. 11
    by Shin-Han Wu, 吳信翰
    Published 2007
    ... of telecommunication services, they simultaneously consider the invisible threat in mobile networks. In order...
    Get full text
    Others
  12. 12
    by Chun-Chih Tsung, 宗峻至
    Published 2010
    ... in computation power, and suffer from security threats. In order to provide the safe and efficient environment...
    Get full text
    Others
  13. 13
    by Tsui-Feng Wu, 吳翠鳳
    Published 2008
    ...碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 97 === The communication model that computer network provides...
    Get full text
    Others
  14. 14
    by Wei-Chen Wu, 吳威震
    Published 2004
    ..., cryptography and security have matured, leading to the development of improved network security...
    Get full text
    Others
  15. 15
    by Chun-rui Liu, 劉醇瑞
    Published 2006
    .... The early stage of computer viruses has gradually changed to the form of network worms. Through fast...
    Get full text
    Others
  16. 16
    by Ho-Hsiang Chan, 詹賀翔
    Published 2010
    .... The vehicular ad-hoc network (VANET) is a novel wireless network, and suffers the security threats as other...
    Get full text
    Others
  17. 17
    by Chih-Chun Liu, 劉志君
    Published 2005
    ..., therefore, the new generation access control usually use role as base framework. The access control security...
    Get full text
    Others
  18. 18
    by Yong-Han Lin, 林永瀚
    Published 2014
    ... networking, a new type in E-Commerce, group buying, is flourishing. Group buying is carried out on attendants...
    Get full text
    Others
  19. 19
    by Ching-wei Chen, 陳進偉
    Published 2006
    ... firewall as the core of network security management. They would set up common firewall rules to satisfy...
    Get full text
    Others
  20. 20
    by Hua-Yi Huang, 黃華儀
    Published 2011
    ...碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 99 === With maturity of the network infrastructure technology...
    Get full text
    Others