Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2003 Issue 11
US's strategies and measures for safeguarding information network security
liu zhu ren
..............
page:73-76
What to do well for ensuring information system security
cai wei
..............
page:71-72
Secret-leaking probably happening around you
li da guang
..............
page:69-71
Network invading detection technique and its security testing
chen qing ming ; guo song bai
..............
page:66-68
Research and design for modeling method of management information
li fei ; tie ling
..............
page:62-65
Strategy-based network management
wen kai ; zhu jiang
..............
page:59-62
How much is network security worth?
..............
page:57-58
SafePro network security: three subsystems playing Leading roles
zheng jie chuan
..............
page:56-57
Implementation scheme for Rijndael shift register
wei bao dian ; liu dong su ; wang xin mei
..............
page:54-55
Research, application and development of proxy technology
qu yan wen
..............
page:14-16
Industrialization is the only road for infosec development
zhu yan
..............
page:1-1
Adopting integrated management and technical measures, raising the level for infosec assurance
..............
page:6-7
Symposium for national infosec strategy held in Zhengzhou
..............
page:8-8
Exhibition rationalized, industry pragmatized
wang ya fei
..............
page:9-11
Source code open for security--Lab for source code from on-file to examination
cui guang yao
..............
page:11-13
Secret-helmet "file safe" : brilliant ideas for protecting information from being stolen
..............
page:77-77
Saimengtike brought forth trick-based invading detection system
..............
page:78-78
Check Point series security products
..............
page:79-79
Swivel powerful bi-element dynamic password certification system
..............
page:80-80
"Security is not equal to piling-up of products"
..............
page:52-53
Economic, secure, reliable: Hainan CBIC building up powerful multi-service network
..............
page:51-52
Technical framework in supporting electronic signature law
liu hai long ; zhang qi shan ; wu jin pei
..............
page:48-50
Sincerity never being locked by cipher--Note on interview wit Nan Xianghao
cui guang yao
..............
page:45-47
Security analysis and basic strategies for GPRS access
chen shun
..............
page:42-44
Design and implementation of monitor system for host's unauthorized external connection
tang kui ; zhu lin
..............
page:40-41
A new analysis method on varied IDEA cryptography
zhou xuan ; li chao
..............
page:37-39
Management of IDS system based on general information model
xiao zuo ; li jian hua
..............
page:34-36
Research on IPSEC/VPN dynamic routing
qiao yuan song ; li qing
..............
page:33-34
Study of "poker" digital secure communication based on chaotic attractor
zhan ming ; zhang cui fang
..............
page:31-32
Study and exploration of encoding and decoding algorithms in FAX
xiao da ; li qing bao ; bai yan
..............
page:29-30
High-sight reaching far, depth having distant roads
xiang yong yang
..............
page:26-28
WatchGuard providing medium-and-small-size enterprises with flaw assessment services
..............
page:25-25
Westone crypto devices bid off "CBC's Project for ATM Function Expansion"
..............
page:24-24
China's 5th Exhibition of International Computer Information System Security closed in Beijing
..............
page:23-23
Research on assurance architecture for large information system
chen ai min
..............
page:20-22
Trusted computational introduction
chen zhong ; liu peng ; liu xin
..............
page:17-19