Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2006 Issue 1
The Three Approaches to Implement Communication Safety
Cai Zixing;Zou Linxiang
..............page:80-81,85
ECC-based CDMA Authentication Protocol
Jiang Xiaomei;Ren Zhaorong
..............page:86-88
An Adaptive OFDM Symbol Synchronization Algorithm
Wang Ding;Xu Jiadong;Yang Chuan
..............page:77-79
The Design of Dynamical Key Mechanism in ETCS
Mo Songhai;Yu Xiaofeng
..............page:74-76
Blind Signature Based on DSA and a Modification of DSA
Chen Shaozhen;Wan Xianyun
..............page:72-73,76
Build up secure data centre
Li Xue
..............page:31-32
Transformation
You Xiaoming
..............page:17-20
Risk assessment needs a protracted war
..............page:15-16
Chang'an is just under the horse's hoof
zong bian shi
..............page:1-2
Industry Events
..............page:9-12
Countermeasure and security threats analysis of SCTP
Zhao Jianqing;Zhang Shunyi;Gong Changlong
..............page:69-71
A New Gateway Based on Image Content Filtering
Zhou Li;Wang Shilin;Li Shenghong;Li Jianhua
..............page:66-68
A Secret Sharing Scheme with Perfect Secrecy Feature
Wei Feng;Zhang Jianzhong
..............page:64-65,68
Application of Trusted Network Connect (TNC) Architecture
Ye Mao;Luo Wanbo
..............page:58-60
Smart Card Application for Wireless Transaction
Liu Zhiqiang
..............page:53-57
Security Protocol and Security Problem in IPv6
Bian Bin
..............page:50-52
The Security Analysis of VoIP Based on H.323
Kang Rongbao;Tan Xinglie
..............page:46-49,52
Hash-Chain Trees Based Security Scheme in HAWAII Micro-Mobility Protocol
Feng Nan;Tie Ling;Li Jianhua
..............page:42-45
Windows patch management based on eCop customer
shang hai bao xin ruan jian gu fen you xian gong si
..............page:40
Cacti application solution: SPI Master
shen zuo shi zhong xing ji cheng dian lu she ji you xian ze ren gong si
..............page:38-40
CipherTrust: the leader of e-mail security
Li Xue
..............page:35