Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2003 Issue 4
Expanding firewall's functionality, recreating new record of cost-effectiveness
..............
page:77-78
Informatization calling for security supervising mechanism
zhao chun hong
..............
page:74-76
“Netwar” in US and Iraq war
dong zuo
..............
page:73-73
National Security Bureau examined and approved units for disposition of security-concerned system integration
..............
page:70-72
National Security Bureau approved technically checked and accepted products
..............
page:69-69
PLA Infosec Testing and Evaluating Gentre experimenting classification of military infosec products
..............
page:68-68
Announcement for certified products and personnel from China Testing and Evaluating
..............
page:67-67
Ziguang Biwei creating a new thinking of China network security
qing hua zi guang bi wei wang luo ji shu you xian gong si
..............
page:65-66
Security, sharing and speed
bei jing tian xing wang an xin xi ji shu you xian ze ren gong si
..............
page:64-65
A clap of spring thunder in silence
wang lin
..............
page:62-63
“Frightening word in flourishing age”: e-government and security
wang ya fei
..............
page:14-17
Source code: Knowledge of opening-up
wang lin
..............
page:10-13
Elementary description of China's infosec assurance architecture
wang zuo jing
..............
page:1-1
Vitalizing software industry, ensuring China's inforsec
mu zi
..............
page:6-7
Government, commerce chamber and enterprises jointly probing into China's development of inforsec industry
li xue
..............
page:8-9
WatchGuard FBⅢ firewall's strong proxy function
..............
page:79-79
Experts' comments on present publication
..............
page:79-80
Network blackbox --first strike of intrusion evidence-obtaining
xiang yong yang
..............
page:61-61
Samsung-security aiming at China market
zhao chun hong
..............
page:60-60
Application of Windows 2000PKI in e-commerce security
wang guo ming
..............
page:58-59
On digital signature and electronic signature
liu hai long
..............
page:56-57
Sincerity, dealing with concrete matter and on the way --- a note of general-manager Zhang Qian
xiang yong yang
..............
page:53-55
A galaxy of talents, a mainstay towering
li xue ; xiang yong yang
..............
page:49-52
Camellia-a novel 128bit block crypto algorithm
gong jing ; deng yuan qing ; tao zhuo bin
..............
page:45-48
Study on quantum crypto technology
wen lei ; li ming
..............
page:43-45
Research on attack language of intrusion detection system
zuo yong gang ; song chuan heng ; yang yi xian ; hu zheng ming
..............
page:40-42
Research on formalized method of crypto protocol analysis
ren xia ; lv shu wang
..............
page:37-39
Enterprises' policy-makers on 2003 considerations
cui guang yao
..............
page:32-36
Sike's outstanding achievement in 2002
..............
page:31-31
Shenzhou Digital and NOKIA jointly doveloping network security
..............
page:30-30
ORACLE and UNITEDLINUX jointly expanding LINUX market
..............
page:29-29
Network division and security in e-government construction
du hong
..............
page:26-28
e-Government security architecture
zuo he zuo
..............
page:23-25
Annual report on 2002 information security abroad (part 2)
wu shi zhong
..............
page:18-22