Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2005 Issue 10
The Method to Resist the DDoS with DIDS
Xu lei;Li Jiuying
..............page:72-74
The Research on SIP Signaling Security in Softswitch System
Wei Yabing;Su Hong;Hao Ping
..............page:75-78
Fingerprinting to Honeypot and Protecting Methods
Jiang Xin;Xue Zhi
..............page:79-82
An E-government Access Control System Model Based on RSA
He bin;Li linsen
..............page:83-84
Anomaly Detection Base on Neural Network
Liao Junkai
..............page:85-87
Study of Encryption Techniques Secret Key Image Based
Feng Zhaoyan;Cai Xiaodong
..............page:88-90
Study on LMAC and Hash Function Based on Goldreich Compression Function
Yu Weichi;Zhu Shixiong;He Dake
..............page:91-94,97
The Study and Perspective of Perceptual Speech Quality Assessment Technologies for VoIP
Yao Zhonghua;Huang Jianguo;Zhang Yi
..............page:69-71
A Method of Man-in-the-middle Attack Based On ARP Spoofing
Guo Hao;Guo Tao
..............page:66-68
Design and Implementation of an Automated Penetration Testing Framework
Guo Baidong;Wang Yijun;Xue Zhi
..............page:63-65
Key Management in Secrecy Communication System
Ding Wenxia;Wang Hao;Cheng Jianghua;Yan Wei
..............page:60-62
Research on the Text Information Control Technique Based on Concept Analyses
Xiong Jingxian;Li Shenghong
..............page:57-59
Study on the CATV Encryption System
Zhang Chuanwu;Huang Qinzhen;Zhang Tianqi
..............page:55-56
The next node for technology of infosec products
Cui GuangYao
..............page:1

..............page:6-7
Industry Events
..............page:8-10
Technical pursuit under complicated infosec conditions
Cui GuangYao
..............page:11-13
Founder's re-quenching of its information security
Cui Guangyao
..............page:21-22
The Overview of DDoS Defense Techniques
Li Miao;Wu Shizhong;Li Bin
..............page:51-54
Exploration on computer network security and protection
zhang han wen ; yang chun shan ; xu jun chao ; meng yang ; xing jun ; zhang qiu juan ; yang xiao hong
..............page:40-42
Content security management in great demand by the market
Cui Guangyao
..............page:30-31
Access to system management, raise IT service value
Li Xue
..............page:26-27
e-Government security model incorporating PKI and RBAC technologies
wang lin ; luo wan bo ; xiong ke
..............page:23-25