Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2000 Issue 2
An ID-based Authentication and Key Distribution Scheme
Wu Qiuxin;Yang Yixian;Hu Zhengming
..............page:6-8,16
The Security of Intranet and Group Cipher Method
Zhu Liang
..............page:9-12
Research on Security Issues of Web Database
Cui Guohua
..............page:13-16
Research on the Security of the EIGamal-Type Signature Scheme
Ma Yanqing;Deng Yuanqing
..............page:17-19,25
The Defects of Newton Channel and the Improvement
Zhang Tong;Wang Yumin;Li Zhenfu
..............page:22-25
ji suan ji wang luo shang de an quan guang bo xie yi
peng zuo ; yu xiang xuan ; pei peng jun
..............page:26-29
WIN32-CSP Service Architecture And Its Application
He Zhengbing;Li Xiang
..............page:30-33
Give Full Play to Our Remarkable Skill in Infosec Industry
He Weidong;Zhou Peilong;Meng Qingwu
..............page:67-69
ji suan ji an quan ji shu de tan tao
mao li shan ; cheng sheng li
..............page:34-37,40
On the Existence of a Class of Boolean Functions
Wu Wenling
..............page:38-40
Logical Functions Over Zpl
Wang Jun;Chen Weihong
..............page:41-44,52
On the Information Rate of Perfect Secret Sharing Schemes
Xia Yinghua;Bi Kai
..............page:48-52
Twofish--Candidate of Advanced Encryption Standard
Fan Chunxiang;Zhang Huanguo
..............page:53-58,69
MARS Algorithm--Candidate of Advanced Encryption Standard
Cui Jingsong;Zhang Huanguo
..............page:59-64