Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2005 Issue 4
Applications of cryptogram technology in the information systems
..............
page:82-83
E-government's infosec for Shanghai railway subadministration
Ma Lingchen
..............
page:80-81
The charm of operations fusing with networks
Sun Dehe
..............
page:78-79
Cooperation, revolution & development
Cui Guangyao
..............
page:76-77
The 2nd part of the game's stategy of firmly holding the confidence in victory
..............
page:74-75
Actively defending to realize the 1st layer's security
radware gong si
..............
page:73
Dedicating for security and pursuing superexcellence
Yang Xue
..............
page:72
The management of digital rights & interests supports color messages
Luo Ming;Luo Lei
..............
page:68-71
Research on the mechanism of WLAN's security
Wang Tao;Cai Wandong
..............
page:65-67
Research and design of the system confirming hierarchical roles' accessing control
chen zuo ; xue zhi ; li sheng hong ; jing tao
..............
page:63-64
The technology and applications of mobile's locating
Li Peng;Yu Xiaolong;Lou Jiandong
..............
page:60-62
Thoughts of building the ID's authentication system of martial, dynamic and double-factor
zhu yue chao ; tian yong tai ; da xiao min
..............
page:58-59
VPN technology in the enterprises' backup systems for disasters
Zeng Dechao
..............
page:55-57
The new applications of OFDM in the advanced high-speed wireless telecommunication
Yao Chengfeng;Ge Wancheng
..............
page:52-54
Standards of video compressed-coding and its development
Yin Xiaoying;Gong Jianrong
..............
page:49-51
The device driving programs of PCI based on Linux
ma xiao ; liu shi bin ; xiao yong tian
..............
page:46-49
Analysis of the electromagnetic interfering between UWB and PHS
zhao li zuo ; sun chao ; zhou zheng
..............
page:44-45
Realization of one secure files' sever
Li Chengbin
..............
page:41-43
Only core technologies being held can infosec be held
Ni Guangnan
..............
page:1
CNERT/CC notes the report of 2004 networks' security work
..............
page:6-7
Characters: Zhou Kai, Zhao Ruoyu, Gao Li
..............
page:8-9
Enterprises: Beijing BHL, ISS, MARASI, F5 Networks, Huawei, Karspersky, Jianmin, Feitian Safe, Chengdu Dadong
..............
page:9-13
Security-Info 2005 will be held in May
..............
page:14
2005 global NGN submit forum will be held
..............
page:15
Infosec subtily shows market opportunities
..............
page:16
Only the industry is the origin and only the bright-points is the root
Zhong Jing;Zhang Yanjun;Li Xue
..............
page:17-24
Deeply and widely talking about the topic of infosec
Cui Guangyao
..............
page:25-28
Is your banks' card secure?
WANG Yafei
..............
page:29-30
Is TCP really trustable?
ZENG Bin;Zhong Zhuoxin
..............
page:31-32
Research on the security of channels under the threshold
Ma Lan
..............
page:33-35
Research on the vulnerability of IDS
Liu Weipeng
..............
page:35-37
The next generation of wireless technology of super wide band
tan min chao ; tian zhen li ; fu hai yang
..............
page:38-40
Cases' analyzing for eCop of Baosight's networks' police
Lin Chunhua
..............
page:84-85
The trustable and controllable networks based on TC
wu han rui da gong si
..............
page:86-87
Analysis for confidential data and methods for protecting data
DONG Rui
..............
page:88
Tampering with webpages seriously disserving the security of websites
zhong ruan gong si
..............
page:89
How to deploy the networks' security of 2005
Michael Hamelin
..............
page:90
Simply talking about the influence of decrypting MD5 in the practical applications
Li Dan;Long Yihong
..............
page:91
Realizing the protection for database from OS
zhong jia hua cheng gong si
..............
page:92
VPN gateway preventing DDoS
Shan Rongsheng
..............
page:93
Attending operations, efficiency and security
zhong ke xin ye gong si
..............
page:94
The new generation of USB Key without drive comes out
..............
page:95
TrustedSource 3.0 destroys BotNet
..............
page:95
CA issues the suite of eTrust IAM r8
..............
page:95
2005 nian quan guo kai fang shi fen bu yu bing xing ji suan xue shu hui yi zheng wen tong zhi
..............
page:96