Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2006 Issue 10
Internet security remains an important issue
Li Xue
..............page:10
Why rascal software is rascal?
Li Xue;Cui Guangyao
..............page:7-9
Comparing of SSAM and CEM
Tan Liang
..............page:11-13
A Little Input, Much Incomes
..............page:44
From RC5 to RC6
Jiang Hao
..............page:49-50,54
Design and Implementation of Key Management System of Campus CPU Card System
Liu Jinwei;Huang Zhangqin;Hou Yibin;Wang Pu
..............page:51-54
Encryption Net Card and the Safe Problems of Ether Local Area Network
Liu Yunling;Song Changhong;Meng Hao;Yang Ruiqing
..............page:55-56
DSP Realization of LMS Adaptive Filter
Zhang Huisheng;Yan Xuebin;Qin Yong;Huang He
..............page:72-73
Study on the OFDM System of WLAN
Li Gang;Liu Jie;Fan Chunxiao;Zou Junwei
..............page:74-75,78
E1 Network Interface Design and Protection
Wu Xiaomeng
..............page:76-78
New Systems of Wireless Sensor Networks Based on Cross-layer Design
Lv Xiaoyu;Hu Haifeng;Yang Zhen;Li Zhenning
..............page:79-82
Research of Security Based on Shortwave Data Transmission
Wang Zhanjie;Liu Yongfeng;Li Xian;Wang Jinbao
..............page:100-102,105
Outline a New Future of the Network
Hu Xiaohe
..............page:32-33
SafeNet Seeking a Strong and Stable Channel
Bai Jie
..............page:36
SSL VPN of Array Success in CNPC
Bai Jie
..............page:37
Design of the Safety Data Exchange System for Electronic Port of China Custom
Liu Junyan;Liao Ling;Liu Zhibin
..............page:106-107
Synthesis Algorithm for Linear Cryptanalysis of DES
Yan Shanjun
..............page:89-91
Study on Safety of Electric Power Information System
Tang Lin;Li Yunfeng
..............page:92-94
Electronic Map System Based on Digital Copyright Protection
Chen Xiaoping;Wang Yong
..............page:95-96,99
Analysis to Security Schemes of M-WMAN
Qiu Ciyun;Liu Guangyu;Bu Zhiyong
..............page:57-59
Industry Events
..............page:4-6
How to ensure men's safety?
Cui Guangyao
..............page:1
Evaluation of the Inter-BS Interference in TD-SCDMA System
Luo Zhinian;Zhang Wenjun;Zhang Haibin
..............page:60-62
Summarization of Position Based Routing Algorithm in MANET
Cao Yinglie;Xie Shengli;Yang Weijun
..............page:63-65
LinkTrust Design IPS Maket
Yu Jue
..............page:29
Design of Wireless Spread Spectrum Network Card Basic on DS Technology
Xu Zhe;Zhang Huisheng;Huang He
..............page:66-68,71
Study on Concatenated Code in Underwater Acoustics Communication
Yao Zhonghua;Huang Jiangguo
..............page:69-71
Small Area Implementation of AES
Qin Han;Zhou Yujie
..............page:118-119,122
Several Issues in E-government planning
Du Lian
..............page:14-16
Survey in Digital Rights Management System Interoperability
Chen Luyi;Li Shenhong;Choi Jonguk;Cui Xuenan
..............page:17-18
Research Summarization of E-mail Virus
Wang Weiping;Zhu Weiwei;Chen Wenhui;Liang Liang
..............page:19-22
The Information Security: Form the Ostrich to Sparrow
Hu Xiaohe
..............page:23-24
Construction a Solid Foundation of Ftsafe
Cui Guangyao
..............page:25-26
Digital Payment Networks will over 10,000 during Olympics
Zhou Zhengxing
..............page:31
Building the Secure LAN Based on Netfilter/IPTables
Wang Xiao;Liu Naiqi;Wang Rong
..............page:120-122
Top Structure Automatic Detecting Arithmetic in Ethernet
Liu Jie;Xu Li
..............page:123-124,127
Chaotic Image Encryption Algorithm Resilient to Known/Chosen Plaintext Attrack
Nie Haiying;Zhu Canyan
..............page:125-127
Secure Authenticated Key Agreement with Key Confirmation Protocol
Kuang Huaqing;Xie Dongqing;Xia Feng
..............page:128-129,132
Fast String Matching Algorithms for Intrusion Detection
Xie Jianquan
..............page:130-132
Information Security Risk Evaluation Model Based on Fuzzy Judgment
Dai Hang;Jia Bin;Mu Dejun
..............page:133-134,137
Strand Space Model of ISI Payment Protocol and Its Fairness Analysis
Chen Hao;Cheng Na;He Dake
..............page:135-137
Signaling Security for SIP Protocol Based on SAKA
Wei Yabing;Su Hong;Hao Ping
..............page:138-140,143
Security Assurance of Document Transmitting Under .NET
Dong Lina;Zhang Xianming
..............page:111-114
Analysis and Security Requirement of Typical E-cash Systems
Wang Daxing;Du Yusong;Xie Wenliang
..............page:141-143
Software Protection Bases on Control Transformation
Li Changqing;Li Xiaoyong;Han Zhen
..............page:146-149
Research on Value-added Application of TETRA Digital Trunking System
Fan Wenyue;Zhan Zhiqiang
..............page:150-152
MC Matrix Cover Cryptosystem Based on Knapsack Problem
Xu Meng
..............page:156-158