Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2005 Issue 4
The charm of operations fusing with networks
Sun Dehe
..............page:78-79
Cooperation, revolution & development
Cui Guangyao
..............page:76-77
Actively defending to realize the 1st layer's security
radware gong si
..............page:73
Research on the mechanism of WLAN's security
Wang Tao;Cai Wandong
..............page:65-67
Research and design of the system confirming hierarchical roles' accessing control
chen zuo ; xue zhi ; li sheng hong ; jing tao
..............page:63-64
The technology and applications of mobile's locating
Li Peng;Yu Xiaolong;Lou Jiandong
..............page:60-62
Thoughts of building the ID's authentication system of martial, dynamic and double-factor
zhu yue chao ; tian yong tai ; da xiao min
..............page:58-59
Standards of video compressed-coding and its development
Yin Xiaoying;Gong Jianrong
..............page:49-51
The device driving programs of PCI based on Linux
ma xiao ; liu shi bin ; xiao yong tian
..............page:46-49
Analysis of the electromagnetic interfering between UWB and PHS
zhao li zuo ; sun chao ; zhou zheng
..............page:44-45
Realization of one secure files' sever
Li Chengbin
..............page:41-43
Only the industry is the origin and only the bright-points is the root
Zhong Jing;Zhang Yanjun;Li Xue
..............page:17-24
Deeply and widely talking about the topic of infosec
Cui Guangyao
..............page:25-28
Is your banks' card secure?
WANG Yafei
..............page:29-30
Is TCP really trustable?
ZENG Bin;Zhong Zhuoxin
..............page:31-32
Research on the vulnerability of IDS
Liu Weipeng
..............page:35-37
The next generation of wireless technology of super wide band
tan min chao ; tian zhen li ; fu hai yang
..............page:38-40
Cases' analyzing for eCop of Baosight's networks' police
Lin Chunhua
..............page:84-85
The trustable and controllable networks based on TC
wu han rui da gong si
..............page:86-87
How to deploy the networks' security of 2005
Michael Hamelin
..............page:90
Realizing the protection for database from OS
zhong jia hua cheng gong si
..............page:92
VPN gateway preventing DDoS
Shan Rongsheng
..............page:93
Attending operations, efficiency and security
zhong ke xin ye gong si
..............page:94
TrustedSource 3.0 destroys BotNet
..............page:95
CA issues the suite of eTrust IAM r8
..............page:95