Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2005 Issue 12
Explore the Network-Security Scheme for Big Enterprise
Hong Jing;Mei Songhuang
..............
page:53-57
Research on Adaptability of Several Key Management Mechanisms in Ad Hoc Sensor Networks
Ou Huiming;Chen Jianbo;Qi Kaiyue
..............
page:58-60
The Analysis of WLAN Security Shortage
Zhou Guitang;Lin Bogang
..............
page:61-64
Realization of Secure Web under Electronic Government Affair Platform
Pu Hai;Liu Xiufeng;Li Tao;Hu Xiaoqin;Du Yu;Guo Jing
..............
page:65-67
Research on High Availability of Network Intrusion Prevention System
Yin Shaoping
..............
page:68-69,72
The research and realization of RSA algorithm
Song Xiaoli
..............
page:70-72
Application of DSP to Digital Switcher
Zhang Guobo
..............
page:73-75
Research on Protection Profile of Common Criteria for ASP
Zheng Wenli;Chen Jianbo
..............
page:76-78,81
Detecting on Steghide based on OC_SVM
Zhang Xiaoxia;Chen Liya;Li Jianhua
..............
page:79-81
The Study on the US Armed Forces NCW Strategies in Construction and Technique
Wang Qi;Dan Jun
..............
page:82-84
A Safe Testament Protocol Based on Signcryption
Wei Feng;Zhang Jianzhong
..............
page:85-86
Research and Realization of the Network Isolation Technology
Liu Chaoping;Feng Dengguo
..............
page:87-89
The easiest choice for raising the quality of enterprises'secure network-logon
..............
page:52
SonicWall's new version UTM published
..............
page:52
F5 and Qracle jointly putting out BIG-IP
..............
page:51
Zhong'an's "office" going along two roads of standardization and secret-involution
..............
page:50-51
New member of CA products:Ge'er SRQ15
shang hai ge er ruan jian gu fen you xian gong si
..............
page:49
Patriot King-Memory of 3rd generation stepping out in Beijing
bei jing hua qi zi xun ke ji fa zhan you xian gong si
..............
page:48
The clearance of DLL "back-door" is in reality quite simple
Leng Zhicheng
..............
page:46-47
New network threats existing everywhere
Wu Ruosong
..............
page:44-45
Cases of netsec application at China's Software Export Base in Tianjin
shang hai bao xin ruan jian gu fen you xian gong si
..............
page:42-43
Baoxin eCop's application in prevention of secrets compromises
shang hai bao xin ruan jian gu fen you xian gong si
..............
page:40-41
Lenovo Net-defend's solution of "hierachal security management"
lian xiang wang yu ke ji you xian gong si
..............
page:38-39
UART's application solution
shen zuo shi zhong xing ji cheng dian lu she ji you xian ze ren gong si
..............
page:36-37
Content security management taking advantage to bring its force in full play
Cui Guangyao
..............
page:35
Use the profit under heaven to meet the need under heaven
Cui Guangyao
..............
page:1
China has initially established 5 tasks in the future five years' information industry development
..............
page:6
China's informatization development strategy reviewed and adopted
..............
page:6
New Beijing Digital Security City will be preliminarily brought up in 3 years
Zhang Jing
..............
page:7
Industry Events
..............
page:8-10
"The 11th five-year plan"-The oversea version of information security
Cui Guangyao;Li Xue
..............
page:11-16
The increase of the netsec product market still evident
Zhang Xi
..............
page:17-18
Financial infosec going along the road of security management platform
Wang Daichao;Zeng Dechao
..............
page:19-21
10 years' road with wind and rain, the time for China's dragon-like rising
Hu Xiaohang
..............
page:22-23
Who says that the chicken feather cannot fly up to the sky
Cui Guangyao
..............
page:24-25
What way the Central Bank's policy shows us
..............
page:26-27
45% consumers over the world thinking to change the banks
Unisys
..............
page:26-31
dan bi bu chao 1000, ri lei ji bu chao 5000
..............
page:27
ca cheng shu biao zhun kun huo fei fa jiao yi chang zuo
..............
page:28-29
zuo you zhi fu gong si de zhan lue jue ce
..............
page:30
zui wei guan zhu wen ti de wen yu da
..............
page:31
Dongran implements NP technology in its entire-length firewall products
Cui Guangyao
..............
page:32
IBM: deducing practical offensive strategy of "integration"
Li Xue
..............
page:33-34
Discussion about Network Safety
Cai Zixing;Dong Chunjian
..............
page:90-91
Designing And Implementation Of Security Digital Sign Service Platform Based On PKI
Huo Jia;Zhang Chun'e;Qiu Zhengding
..............
page:92-94
A Blind Multi-user Detection Algorithm in MC-CDMA System
Zhao Su
..............
page:95-97,100
An Improved Design of Boyer-Moore Algorithm
He Qiang;Qing Yu
..............
page:98-100
Characteristics of Multi-layer Composed Boolean Functions
Chen Wei;Yang Yixian
..............
page:101-102
Design and Implemention of Intranet illegal Web and ill Information Detection System
Liu Bin;Wang Shihua
..............
page:103-106