Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2004 Issue 3
Information about Microsoft flaws
..............
page:72-72
Products technically appraised (accepted) or tested by State Secrets Bureau
..............
page:73-73
List of qualified units for security-involved system integration authorized by State Secrets Bureau
..............
page:74-75
Patriot computer lock - infosec guard
..............
page:76-76
My Doom - Latecomer surpasses old-timers, dominates virus family for one month
..............
page:77-77
Be careful in preventing Windows password from being broken
zhang yu an ; feng deng guo
..............
page:70-71
What to be thought in purchasing firewall and VPN products ?
Paul Serrano
..............
page:68-69
Linking-up, linking-up, and linking-up again - Infosec enterprises talking on "co-operation with professional media"
xiang yong yang
..............
page:66-67
Technical application of multi-line in VPN
li bing
..............
page:64-65
Distributed network′s loopholes and their solutions
yang lei
..............
page:61-63
Escort Xiamen Customs by servgat modular secure gateway
..............
page:59-60
Let network itself possess resistance
..............
page:57-58
New spring prelude to Dongran netsec
cui guang yao
..............
page:55-56
Brook no delay in strengthening electronic monitor within enterprise
..............
page:54-54
An improved protocol of secure electronic transaction
jiang zhi xiong ; hong fan
..............
page:52-53
Wang Jiangming - dedicated to exercising magic powers against viruses
xiang jie
..............
page:49-51
New identification method of sensitive image features based on nervous network
yang wei ji ; li sheng hong ; yang shu tang
..............
page:44-48
Cascade characters and applications of Bent function in crypto system
jin jun e ; li chao
..............
page:42-44
Design on smartcard-based secure log system
zhang fan ; zhang shen sheng ; tang ye ; dai wei
..............
page:38-41
Recent development of TLS protocol
tao zhuo bin ; zhang ning
..............
page:35-38
Research on network log audit techniques based on hidden Markov Model
lv dong ; li jian hua
..............
page:32-34
Analysis and comparison of security models based on multi-side security policy
hu jing ; luo wan bo ; liu xiao feng ; lei kai chun
..............
page:29-31
VLSI implementation of AES crypto algorithm
liu hai jiang ; rong meng tian
..............
page:26-28
Plan strategies within a command tent,virus-killing in whole network-- Note on Ruixin Sci & Tech Corp.
bai su
..............
page:24-25
Saimentike lets data speak
cui guang yao
..............
page:23-24
7th China International Smartcard Fair to be held
..............
page:22-22
Tianrongxin several-million-yuan contracts beating monkey-year′s battle drum
..............
page:21-21
Vigorously raising security awareness of the whole society
du hong
..............
page:1-1
China′s four government departments seriously harness garbage mails
..............
page:6-7
China′s e-government development presents 10 trends in 2004
..............
page:6-6
Five features for China's Internet development
..............
page:7-7
Infosec problems in experts′eyes
cui guang yao
..............
page:8-11
Knowledge security and controllability
chen xue xiu ; lv shu wang ; sun peng
..............
page:12-15
Pay close attention to infosec in new military revolution
chen jun rong
..............
page:16-17
Security assurance and risk assessment
zhou ning ; xue zhi ; li jian hua
..............
page:18-20
National Meeting for Emergency Handling of Internet held
..............
page:21-21
International ACNS conference landed on China again
xiang yong yang
..............
page:78-78
Briefs on products of network isolation controller for client end
..............
page:79-79
Solutions for CA advanced data protection
..............
page:80-80
Sophos brought forth new version of Pure Message
..............
page:80-80