Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2006 Issue 4
KOAL: Guards Against Divulges Secret on Workstation
shang hai ge er
..............page:54-55
Taigu: Host Monitor & Audit System
cheng du tai gu
..............page:55
SANLEN: Products Assisting in Inner Network Supervision
shang hai shan li
..............page:56
Front: Digital Resource Security Management Platform
qian yan ke ji
..............page:57
Thinkor: Sword-fish Network Control System
li gong xian he gong si
..............page:58
LanXi Tech: ChangYing Computer Information Security System
hang tian lan xi ke ji
..............page:59-60
CS&S: Reliable Mobile Storage Media Management System
zhong ruan gong si
..............page:60
NetentSec: NetentSec Internet Control Gateway
wang kang ke ji
..............page:53
LanSecS: Inner Network Security Management System
sheng bo run gong si
..............page:52-53
BaoSight: eCop's Application Case in Electric Industry
shang hai bao xin
..............page:50-51
CS&S: Scheme of Dealing with Inner Network Problems
zhong ruan gong si
..............page:49-50
SSL VPN Enforce OA System in Tianjing Electric Enterprise
Array Networks
..............page:48
Inner Network Supervision Products Applies in Electric Enterprise
sheng bo run gong si
..............page:46-48
Supervision Needs Close to Information Security
Cui Guangyue
..............page:1
Industry Events
..............page:10-12
ZhongAn Tech: Practicer of Independent Innovation
Hu Xiaohe
..............page:20-22
Business Principles of FeiTian's Abroad Market
Cui Guangyue
..............page:23-24
Blue Coat: Content Security Stands Firm on Trends
Cui Guangyue
..............page:25-26
HuaWei-3Com: New Era of Security
Li Xue
..............page:27-28
Make Storage More Simple
Hu Xiaohe
..............page:29
Juniper: Network Security Research Report Released
Cui Guangyue
..............page:30
OIIM: Marched in Network Security
Cui Guangyue
..............page:32
nei wang an quan chan pin jian wei zhu dao
jin dan
..............page:36-37
ji xu zhong guo te se he ben di fu wu
yuan shen gang
..............page:37-38
zhi neng hua jia jie mi chan pin cheng zhu liu
wang xiao bo
..............page:38-39
xin xi an quan de zhu zhan chang
yin guo qiang
..............page:39
2006, nei wang an quan shi chang de zeng chang qi
zhou jun min
..............page:40
nei wang an quan yuan wei cheng shu
huang min
..............page:40-41
The Design of the VPN Gateway of Firewall Integrated
Cui Yanli;Wang Jianhua;He Liangsheng
..............page:61-62,66
Uniform Authentication Schema of Commercial Bank
Wang Liangsheng;Chen Kefei;Qiuweidong
..............page:63-66
A Study on Privacy for LBS System
Shi Yun
..............page:67-69
An Adaptive Digital Watermarking Algorithm Based on LAB Color Space
Wang Zhong;Chen Haiqing
..............page:70-72
A New Method of Fingerprint Verification Based on Fingerprint Texture Character
Tao Fen;Li Yong;Zhang Xiaoqiang
..............page:73-75
AIK Management in TPM
Guo Yu
..............page:76-78
High-speed Implementation of AES
Xu Yanping;Zhou Yujie
..............page:81-83
The Application of Unpredictability Equals to Pseudorandomness
Zhao Lijie;Qian Senshui;Chen Yufeng
..............page:87-88
Design and Research about A New Linear Congruence Generator
Liu Fen;Ma Xingbing;Cao Jihua
..............page:89-90,93
Constructing of Elliptic Curves Encryptic System
Liu Zhimeng;Peng Daiyuan
..............page:94-96
Research on Workflow Technology and Its Applications
Zhou Wen;Xiong Ping;Tang Wenzhang
..............page:97-99,102
An Image Compression Algorithm Based on DCT Coefficients Rearranged By Wavelet Structure
Wang Guohua;Chen Hong;Yu Yibiao;Rui Xianyi
..............page:100-102
The Power Control of CDMA and System Simulation in MATLAB
Zhang Bo;Liu Lan
..............page:103-104,107
An Analysis of Routing Protocol for Wireless Ad hoc Network
Lv Linjie;Liu Lan
..............page:105-107