Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2000 Issue 2
guan yu mi ma he tiao pin xiang jie he ji shu fang an de san zhong she xiang
zhu fu chen
..............
page:1-5
An ID-based Authentication and Key Distribution Scheme
Wu Qiuxin;Yang Yixian;Hu Zhengming
..............
page:6-8,16
The Security of Intranet and Group Cipher Method
Zhu Liang
..............
page:9-12
Research on Security Issues of Web Database
Cui Guohua
..............
page:13-16
Research on the Security of the EIGamal-Type Signature Scheme
Ma Yanqing;Deng Yuanqing
..............
page:17-19,25
Cryptanalysis of Key Agreement Scheme Based on Generalised Inverses of Matrices
Yang Junhui;Zhang Yufeng
..............
page:20-21
The Defects of Newton Channel and the Improvement
Zhang Tong;Wang Yumin;Li Zhenfu
..............
page:22-25
ji suan ji wang luo shang de an quan guang bo xie yi
peng zuo ; yu xiang xuan ; pei peng jun
..............
page:26-29
WIN32-CSP Service Architecture And Its Application
He Zhengbing;Li Xiang
..............
page:30-33
Give Full Play to Our Remarkable Skill in Infosec Industry
He Weidong;Zhou Peilong;Meng Qingwu
..............
page:67-69
ji suan ji an quan ji shu de tan tao
mao li shan ; cheng sheng li
..............
page:34-37,40
On the Existence of a Class of Boolean Functions
Wu Wenling
..............
page:38-40
Logical Functions Over Zpl
Wang Jun;Chen Weihong
..............
page:41-44,52
Two Kinds of Key Distribution Schemes Based on Fibonacci-Lucas Sequences
Wang Liping
..............
page:45-47
On the Information Rate of Perfect Secret Sharing Schemes
Xia Yinghua;Bi Kai
..............
page:48-52
Twofish--Candidate of Advanced Encryption Standard
Fan Chunxiang;Zhang Huanguo
..............
page:53-58,69
MARS Algorithm--Candidate of Advanced Encryption Standard
Cui Jingsong;Zhang Huanguo
..............
page:59-64