Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2005 Issue 6
The protocol of authenticated session-key's agreement
yu ping ; guo zhen ; jin zhu ; yuan dong hao
..............page:95-100
VCN is the technology for the virtual cellular net
li wen ; zheng yu ; he da ke
..............page:101-103
Analysis on the synchronization influence of QPSK's carder wave disturbed by single-frequency
qiu dan ; zhang bin ; xu hua ; wan jian ; cao shi wen
..............page:104-106
Research on the key technology of communications' counterwork
guo shu xia ; zhang zuo zuo ; hua guang xue ; liang hua qiang
..............page:107-108
The distributed algorithm of dynamic OVSF code in 3G
wang jing ; liu cai xia ; ji xin sheng ; zhu yun zhi
..............page:91-94
Research on the time field reflect speciality of UWB impulse signals
wang yang ; chen ping ; sun ya zuo ; tang
..............page:89-90
DCC channel configuration method and the performance simulation
REN Gang;Xu Jiapin
..............page:87-88
The technology of TD-SCDMA quickly-build-call based on DS field
Zhang Xiangdong;DAI Zhaoxia
..............page:83-86
Measurement and application of antenna's remote field direction map
Bao Junsong;Fu Demin
..............page:81-82
One authentication model for the mobile agent systems
Qu Yingwei;Zheng Guanghai
..............page:78-80
One solution of preventing worm's spread
wu yong ; zhou yong chao ; shen zuo
..............page:75-77
Analysis and improvement for the SIP authentication system
WANG Yuanli;Yan Jian
..............page:70-72
Realizing the management of IP addresses by ARP
Tang Kui;Guan Junxia
..............page:73-74
Build the efficiency of government's secure-mobile office
Shan Rongsheng
..............page:132-132
The memory king for country-guard infosec
..............page:133-133
Guofu'an's infosec report system
..............page:137-137
F5's advanced solution of SSL VPN
..............page:138-138
lai zi ye jie de qi dai
..............page:14
Big companies' marketing step was mended
Cui Guangyao
..............page:116-117
The application of PKI for social insurance e-government
Cheng Xiaolei
..............page:118-120
The security solution for the commercial bank on the net (ParI)
Deng Ziyun;WANG Rulong
..............page:122-123
The new space-time of inner nets' security
Lin Chunhua
..............page:124-125
Attention and expectation
Shu Bin
..............page:1-1
Industry Events
..............page:8-10
Innovation decides success or not
Cui Guangyao
..............page:15-17
Research and practice of infosec risk evaluation
Chu Maoyang
..............page:21-23
Harmonious development of construction of infosec secrecy system and information system
zhao xing li ; sun xin zhu ; ji xi lin
..............page:24-27
The realization for FPGA of CICA filters
Shi Wei;HUANG Peiwei
..............page:28-30
The relative technology and application of modern ICC
Luo Binbin
..............page:37-39
Primary research on the security of wireless RF identification
hu xiao ; chen xing ; wu zhi gang
..............page:39-42
Security of the cryptogram system
Li Xubo;Jiang Chunxia
..............page:43-45
Research on the collateral technology for the high-performance VPN gateway
wang jing su ; li zhi tang ; mei song
..............page:46-48
The design of RSOC's system and configuration based on multi agents
Qi Jianhuai;Wang Xuehui
..............page:49-51
New trend of network security platform design
Sun Wei;Wang Jianmin
..............page:52-55
ECC is the future of PKI systems
Fang Danyu
..............page:58-60
The realization of RSA-based authentication download protocol
Wu Chungang;Zhou Yujie
..............page:61-62
Design and realization for the distributed event-service based on J2EE
yu yi ; li jian hua ; zhang shao jun
..............page:63-65
PacketUpper generally optimized networks' traffic
WU Jianxin
..............page:128-129