Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2005 Issue 12
Explore the Network-Security Scheme for Big Enterprise
Hong Jing;Mei Songhuang
..............page:53-57
Research on Adaptability of Several Key Management Mechanisms in Ad Hoc Sensor Networks
Ou Huiming;Chen Jianbo;Qi Kaiyue
..............page:58-60
The Analysis of WLAN Security Shortage
Zhou Guitang;Lin Bogang
..............page:61-64
Realization of Secure Web under Electronic Government Affair Platform
Pu Hai;Liu Xiufeng;Li Tao;Hu Xiaoqin;Du Yu;Guo Jing
..............page:65-67
The research and realization of RSA algorithm
Song Xiaoli
..............page:70-72
Application of DSP to Digital Switcher
Zhang Guobo
..............page:73-75
Research on Protection Profile of Common Criteria for ASP
Zheng Wenli;Chen Jianbo
..............page:76-78,81
Detecting on Steghide based on OC_SVM
Zhang Xiaoxia;Chen Liya;Li Jianhua
..............page:79-81
A Safe Testament Protocol Based on Signcryption
Wei Feng;Zhang Jianzhong
..............page:85-86
Research and Realization of the Network Isolation Technology
Liu Chaoping;Feng Dengguo
..............page:87-89
New member of CA products:Ge'er SRQ15
shang hai ge er ruan jian gu fen you xian gong si
..............page:49
Patriot King-Memory of 3rd generation stepping out in Beijing
bei jing hua qi zi xun ke ji fa zhan you xian gong si
..............page:48
The clearance of DLL "back-door" is in reality quite simple
Leng Zhicheng
..............page:46-47
New network threats existing everywhere
Wu Ruosong
..............page:44-45
Cases of netsec application at China's Software Export Base in Tianjin
shang hai bao xin ruan jian gu fen you xian gong si
..............page:42-43
Baoxin eCop's application in prevention of secrets compromises
shang hai bao xin ruan jian gu fen you xian gong si
..............page:40-41
Lenovo Net-defend's solution of "hierachal security management"
lian xiang wang yu ke ji you xian gong si
..............page:38-39
UART's application solution
shen zuo shi zhong xing ji cheng dian lu she ji you xian ze ren gong si
..............page:36-37
Industry Events
..............page:8-10
"The 11th five-year plan"-The oversea version of information security
Cui Guangyao;Li Xue
..............page:11-16
Financial infosec going along the road of security management platform
Wang Daichao;Zeng Dechao
..............page:19-21
Who says that the chicken feather cannot fly up to the sky
Cui Guangyao
..............page:24-25
Discussion about Network Safety
Cai Zixing;Dong Chunjian
..............page:90-91
Designing And Implementation Of Security Digital Sign Service Platform Based On PKI
Huo Jia;Zhang Chun'e;Qiu Zhengding
..............page:92-94
A Blind Multi-user Detection Algorithm in MC-CDMA System
Zhao Su
..............page:95-97,100
An Improved Design of Boyer-Moore Algorithm
He Qiang;Qing Yu
..............page:98-100
Characteristics of Multi-layer Composed Boolean Functions
Chen Wei;Yang Yixian
..............page:101-102