Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2006 Issue 1
The Three Approaches to Implement Communication Safety
Cai Zixing;Zou Linxiang
..............
page:80-81,85
Setting Up a Harmonious and Health Internet Strengthening the Information Security Under the Network Eviornment
Xiao Huixin
..............
page:82-85
ECC-based CDMA Authentication Protocol
Jiang Xiaomei;Ren Zhaorong
..............
page:86-88
The Analysis of Methods for the Wiretap and Counter-Wiretap of Submarine Optic Cable
Wu Jun;Zhao Sixin
..............
page:89-91
An Adaptive OFDM Symbol Synchronization Algorithm
Wang Ding;Xu Jiadong;Yang Chuan
..............
page:77-79
The Design of Dynamical Key Mechanism in ETCS
Mo Songhai;Yu Xiaofeng
..............
page:74-76
Blind Signature Based on DSA and a Modification of DSA
Chen Shaozhen;Wan Xianyun
..............
page:72-73,76
CDP implements "without interruption" protection of data
Li Xue
..............
page:34
RSA and DynamiCode jointly put forward the service of users' identity certification
Li Xue
..............
page:33
Build up secure data centre
Li Xue
..............
page:31-32
Dongruan and Nokia's strategic alliance--Famous mannfacturers' alliance stirring the security structure
Cui Guangyao
..............
page:28-30
National Team experiences Wugang's hammering--a visit to 30SAN Company at the end of the year
Zhang Jing
..............
page:26-27
Research and practice secure inter-access of heterogeneous network-of-networks
Chen Fnafeng
..............
page:23-25
Security situation and expounding of six focal points--a dialogue with Porf Qu Chengyi on some security problems
Li Xue
..............
page:21-22
Transformation
You Xiaoming
..............
page:17-20
Risk assessment needs a protracted war
..............
page:15-16
Chang'an is just under the horse's hoof
zong bian shi
..............
page:1-2
Beijing Municipal Regulations on Public-Service Network and Security Management of Information System
..............
page:7-8
Industry Events
..............
page:9-12
A sudden clap of thundet in silence-recall China's major infosec events in 2005
Cui Guangyao
..............
page:13-14
Countermeasure and security threats analysis of SCTP
Zhao Jianqing;Zhang Shunyi;Gong Changlong
..............
page:69-71
A New Gateway Based on Image Content Filtering
Zhou Li;Wang Shilin;Li Shenghong;Li Jianhua
..............
page:66-68
A Secret Sharing Scheme with Perfect Secrecy Feature
Wei Feng;Zhang Jianzhong
..............
page:64-65,68
Research of F5 Stego-detecting Algorithm Based on High-frequency DCT Coefficient
Wu Ting;Chen Liya;Xue Zhi
..............
page:61-63
Application of Trusted Network Connect (TNC) Architecture
Ye Mao;Luo Wanbo
..............
page:58-60
Smart Card Application for Wireless Transaction
Liu Zhiqiang
..............
page:53-57
Security Protocol and Security Problem in IPv6
Bian Bin
..............
page:50-52
The Security Analysis of VoIP Based on H.323
Kang Rongbao;Tan Xinglie
..............
page:46-49,52
Hash-Chain Trees Based Security Scheme in HAWAII Micro-Mobility Protocol
Feng Nan;Tie Ling;Li Jianhua
..............
page:42-45
Proposed standard template for certain network bank's accelerating engine
f5 networks gong si
..............
page:41
Windows patch management based on eCop customer
shang hai bao xin ruan jian gu fen you xian gong si
..............
page:40
Cacti application solution: SPI Master
shen zuo shi zhong xing ji cheng dian lu she ji you xian ze ren gong si
..............
page:38-40
Major reason of identity defraud: when stragglers and disbanded soldiers meet with the "dark-road" alliance
Wu Yue
..............
page:37
The development of network banking needs removing security doubt
Li Xue
..............
page:36-37
CipherTrust: the leader of e-mail security
Li Xue
..............
page:35