Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2003 Issue 11
Secret-leaking probably happening around you
li da guang
..............page:69-71
Network invading detection technique and its security testing
chen qing ming ; guo song bai
..............page:66-68
Research and design for modeling method of management information
li fei ; tie ling
..............page:62-65
Strategy-based network management
wen kai ; zhu jiang
..............page:59-62
How much is network security worth?
..............page:57-58
SafePro network security: three subsystems playing Leading roles
zheng jie chuan
..............page:56-57
Implementation scheme for Rijndael shift register
wei bao dian ; liu dong su ; wang xin mei
..............page:54-55
Research, application and development of proxy technology
qu yan wen
..............page:14-16
Exhibition rationalized, industry pragmatized
wang ya fei
..............page:9-11
Check Point series security products
..............page:79-79
Technical framework in supporting electronic signature law
liu hai long ; zhang qi shan ; wu jin pei
..............page:48-50
Security analysis and basic strategies for GPRS access
chen shun
..............page:42-44
A new analysis method on varied IDEA cryptography
zhou xuan ; li chao
..............page:37-39
Management of IDS system based on general information model
xiao zuo ; li jian hua
..............page:34-36
Research on IPSEC/VPN dynamic routing
qiao yuan song ; li qing
..............page:33-34
Study of "poker" digital secure communication based on chaotic attractor
zhan ming ; zhang cui fang
..............page:31-32
Study and exploration of encoding and decoding algorithms in FAX
xiao da ; li qing bao ; bai yan
..............page:29-30
High-sight reaching far, depth having distant roads
xiang yong yang
..............page:26-28
Trusted computational introduction
chen zhong ; liu peng ; liu xin
..............page:17-19