Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2004 Issue 3
Information about Microsoft flaws
..............page:72-72
Patriot computer lock - infosec guard
..............page:76-76
Be careful in preventing Windows password from being broken
zhang yu an ; feng deng guo
..............page:70-71
What to be thought in purchasing firewall and VPN products ?
Paul Serrano
..............page:68-69
Technical application of multi-line in VPN
li bing
..............page:64-65
Distributed network′s loopholes and their solutions
yang lei
..............page:61-63
Let network itself possess resistance
..............page:57-58
New spring prelude to Dongran netsec
cui guang yao
..............page:55-56
An improved protocol of secure electronic transaction
jiang zhi xiong ; hong fan
..............page:52-53
New identification method of sensitive image features based on nervous network
yang wei ji ; li sheng hong ; yang shu tang
..............page:44-48
Cascade characters and applications of Bent function in crypto system
jin jun e ; li chao
..............page:42-44
Design on smartcard-based secure log system
zhang fan ; zhang shen sheng ; tang ye ; dai wei
..............page:38-41
Recent development of TLS protocol
tao zhuo bin ; zhang ning
..............page:35-38
Research on network log audit techniques based on hidden Markov Model
lv dong ; li jian hua
..............page:32-34
Analysis and comparison of security models based on multi-side security policy
hu jing ; luo wan bo ; liu xiao feng ; lei kai chun
..............page:29-31
VLSI implementation of AES crypto algorithm
liu hai jiang ; rong meng tian
..............page:26-28
Saimentike lets data speak
cui guang yao
..............page:23-24
Infosec problems in experts′eyes
cui guang yao
..............page:8-11
Knowledge security and controllability
chen xue xiu ; lv shu wang ; sun peng
..............page:12-15
Pay close attention to infosec in new military revolution
chen jun rong
..............page:16-17
Security assurance and risk assessment
zhou ning ; xue zhi ; li jian hua
..............page:18-20
International ACNS conference landed on China again
xiang yong yang
..............page:78-78