Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2004 Issue 2
Discussion on virus protection under groupware environment
ou gang ping
..............page:73-75
World's three public appraisals on crypto algorithms
wang qiu li
..............page:76-78
Two techniques for file hiding
wang shu qin
..............page:79-79
Magic key escorting data security
..............page:72-72
WonicWall:popular products of "noble descent"
li xue
..............page:69-69
Research on implementations of SSO under EAI environment
ma hua xing ; chen jian bo
..............page:41-43
A new port-scanning technology-Idle scanning
chen ; dai zu feng
..............page:38-40
Policy-based security-intelligence-bound model
liang lin ; shi yi juan ; tie ling
..............page:35-37
Research on chaotic-sequence-based DES algorithm
zuo tao ; jiang guo ping
..............page:33-34
Review on embedding technologies for Trojan horse
pan mian ; xue zhi ; li jian hua ; li sheng hong
..............page:30-32
ICCC 2004 to be held in Beijing
..............page:25-25
Netsec affecting state destiny
wang qing dong
..............page:1-1
How to break through personnel bottle-neck of infosec
cui guang yao
..............page:13-16
Security:acquiring triumph through 4~7-level protection
xiang yong yang
..............page:66-67
Network security and Asian enterprises
Peter Thorne
..............page:64-65
Application of network monitoring system in LAN
wang jin lin ; zhao man sheng
..............page:58-59
Infosec-from service to management
wang ya fei
..............page:54-57
Big Legend big security
cui guang yao
..............page:51-53
Building up of circulation pattern for DRM-based e-book
yang xiao peng ; li jia bin
..............page:46-48
Network-based host security and key technologies
ying wei ping
..............page:44-45