Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2005 Issue 10
The Method to Resist the DDoS with DIDS
Xu lei;Li Jiuying
..............
page:72-74
The Research on SIP Signaling Security in Softswitch System
Wei Yabing;Su Hong;Hao Ping
..............
page:75-78
Fingerprinting to Honeypot and Protecting Methods
Jiang Xin;Xue Zhi
..............
page:79-82
An E-government Access Control System Model Based on RSA
He bin;Li linsen
..............
page:83-84
Anomaly Detection Base on Neural Network
Liao Junkai
..............
page:85-87
Study of Encryption Techniques Secret Key Image Based
Feng Zhaoyan;Cai Xiaodong
..............
page:88-90
Study on LMAC and Hash Function Based on Goldreich Compression Function
Yu Weichi;Zhu Shixiong;He Dake
..............
page:91-94,97
The Study and Perspective of Perceptual Speech Quality Assessment Technologies for VoIP
Yao Zhonghua;Huang Jianguo;Zhang Yi
..............
page:69-71
A Method of Man-in-the-middle Attack Based On ARP Spoofing
Guo Hao;Guo Tao
..............
page:66-68
Design and Implementation of an Automated Penetration Testing Framework
Guo Baidong;Wang Yijun;Xue Zhi
..............
page:63-65
Key Management in Secrecy Communication System
Ding Wenxia;Wang Hao;Cheng Jianghua;Yan Wei
..............
page:60-62
Research on the Text Information Control Technique Based on Concept Analyses
Xiong Jingxian;Li Shenghong
..............
page:57-59
Study on the CATV Encryption System
Zhang Chuanwu;Huang Qinzhen;Zhang Tianqi
..............
page:55-56
The next node for technology of infosec products
Cui GuangYao
..............
page:1
..............
page:6-7
Industry Events
..............
page:8-10
Technical pursuit under complicated infosec conditions
Cui GuangYao
..............
page:11-13
Strengthen management of human resources, raise China's infosec insurance level
Xu Donghua
..............
page:14-16
Make great efforts on the Central Plain, chase the deer on the Divine Land--An interview with President Li Dadong
Yang Xue
..............
page:17-18
An upstream partner of network security manufactures--An interview with Mr. Zhang Junhai
Zhang Jing
..............
page:19-20
Founder's re-quenching of its information security
Cui Guangyao
..............
page:21-22
The Analysis of The Security Technologies Involved in IPTV System
Yu Qinyong
..............
page:95-97
The Overview of DDoS Defense Techniques
Li Miao;Wu Shizhong;Li Bin
..............
page:51-54
Zhongxing's secure IC processor of "ball cactus" series
..............
page:50
Sun put forth new x64 enterprise-level system
..............
page:49
CipherTrust released TrustedSource Portal
..............
page:49
SAN multi-protocol router's importance in disaster tolerance
Sima Cong
..............
page:46-48
Network topology discovery 's significance for intranet security
Tang Hong
..............
page:44-45,48
Globally first 2.5in 120G super king-memory being put forth on market
..............
page:43
Exploration on computer network security and protection
zhang han wen ; yang chun shan ; xu jun chao ; meng yang ; xing jun ; zhang qiu juan ; yang xiao hong
..............
page:40-42
Analysis on the situation of service networking by big telecommunication users
Zeng Chunzhi
..............
page:38-39
Build up secure and reliable network platform
..............
page:36-37
Background for raising the concept of hierarchal protection security architecture
..............
page:34-35
Shenxinfu VPN's application in certain city branch of construction bank
..............
page:32-33
Content security management in great demand by the market
Cui Guangyao
..............
page:30-31
Speak glowingly of the 4th quarter's and the whole year's achievements in 2005 Fiscal Year
..............
page:29-30
Far above the earth into the blue, turn from guest into host
..............
page:28
Access to system management, raise IT service value
Li Xue
..............
page:26-27
e-Government security model incorporating PKI and RBAC technologies
wang lin ; luo wan bo ; xiong ke
..............
page:23-25