Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2006 Issue 4
KOAL: Guards Against Divulges Secret on Workstation
shang hai ge er
..............
page:54-55
Taigu: Host Monitor & Audit System
cheng du tai gu
..............
page:55
SANLEN: Products Assisting in Inner Network Supervision
shang hai shan li
..............
page:56
Front: Digital Resource Security Management Platform
qian yan ke ji
..............
page:57
Thinkor: Sword-fish Network Control System
li gong xian he gong si
..............
page:58
LanXi Tech: ChangYing Computer Information Security System
hang tian lan xi ke ji
..............
page:59-60
CS&S: Reliable Mobile Storage Media Management System
zhong ruan gong si
..............
page:60
NetentSec: NetentSec Internet Control Gateway
wang kang ke ji
..............
page:53
LanSecS: Inner Network Security Management System
sheng bo run gong si
..............
page:52-53
BaoSight: eCop's Application Case in Electric Industry
shang hai bao xin
..............
page:50-51
CS&S: Scheme of Dealing with Inner Network Problems
zhong ruan gong si
..............
page:49-50
SSL VPN Enforce OA System in Tianjing Electric Enterprise
Array Networks
..............
page:48
Inner Network Supervision Products Applies in Electric Enterprise
sheng bo run gong si
..............
page:46-48
Supervision Needs Close to Information Security
Cui Guangyue
..............
page:1
Effective Internet Supervision Needs Broken and Stands
..............
page:6-7
Who Is in Charge of Protecting Personal Information?
..............
page:8-9
Industry Events
..............
page:10-12
Risk Evaluation Plays the Trailbreaker Role in Information Security
Cui Guangyue
..............
page:13-15
Discuss of Security Problems in GPRS Network and Measures to Counter
Hong Shunan
..............
page:16-19
ZhongAn Tech: Practicer of Independent Innovation
Hu Xiaohe
..............
page:20-22
Business Principles of FeiTian's Abroad Market
Cui Guangyue
..............
page:23-24
Blue Coat: Content Security Stands Firm on Trends
Cui Guangyue
..............
page:25-26
HuaWei-3Com: New Era of Security
Li Xue
..............
page:27-28
Make Storage More Simple
Hu Xiaohe
..............
page:29
Juniper: Network Security Research Report Released
Cui Guangyue
..............
page:30
Messagesoft: Content Security Denfense Upraded Completely
Cui Guangyue
..............
page:31
OIIM: Marched in Network Security
Cui Guangyue
..............
page:32
e-Government Provides Pattern for Government in Information Age
Meng Lingmei
..............
page:33-34
Domestic Strength Keeps Away Foreign Aggression
Li Xue
..............
page:35
nei wang an quan chan pin jian wei zhu dao
jin dan
..............
page:36-37
ji xu zhong guo te se he ben di fu wu
yuan shen gang
..............
page:37-38
zhi neng hua jia jie mi chan pin cheng zhu liu
wang xiao bo
..............
page:38-39
xin xi an quan de zhu zhan chang
yin guo qiang
..............
page:39
2006, nei wang an quan shi chang de zeng chang qi
zhou jun min
..............
page:40
nei wang an quan yuan wei cheng shu
huang min
..............
page:40-41
nei wang an quan chan pin ying lai " fan rong qi "
yu bo
..............
page:41
Content Administration Is the Key-Point in Purifing Canpus Network
wang kang ke ji
..............
page:42-44
Frontiertech: Content Security Control Products Applied in QinShan Nuclear Power Station
li bin
..............
page:44-45
The Design of the VPN Gateway of Firewall Integrated
Cui Yanli;Wang Jianhua;He Liangsheng
..............
page:61-62,66
Uniform Authentication Schema of Commercial Bank
Wang Liangsheng;Chen Kefei;Qiuweidong
..............
page:63-66
A Study on Privacy for LBS System
Shi Yun
..............
page:67-69
An Adaptive Digital Watermarking Algorithm Based on LAB Color Space
Wang Zhong;Chen Haiqing
..............
page:70-72
A New Method of Fingerprint Verification Based on Fingerprint Texture Character
Tao Fen;Li Yong;Zhang Xiaoqiang
..............
page:73-75
AIK Management in TPM
Guo Yu
..............
page:76-78
Safety Measures of Local Area Network Security in Procuratorial Organ
lin Ximei
..............
page:79-80,83
High-speed Implementation of AES
Xu Yanping;Zhou Yujie
..............
page:81-83
Application of a kind of Modified Residual Error Gray Predict Model in Power Load Forecasting
Zhao Xueqin;Song Limin
..............
page:84-86
The Application of Unpredictability Equals to Pseudorandomness
Zhao Lijie;Qian Senshui;Chen Yufeng
..............
page:87-88
Design and Research about A New Linear Congruence Generator
Liu Fen;Ma Xingbing;Cao Jihua
..............
page:89-90,93
Fast Implementation of the Low Level Operation in ECC Based on GF(2m)
Peng Qingjun
..............
page:91-93
Constructing of Elliptic Curves Encryptic System
Liu Zhimeng;Peng Daiyuan
..............
page:94-96
Research on Workflow Technology and Its Applications
Zhou Wen;Xiong Ping;Tang Wenzhang
..............
page:97-99,102
An Image Compression Algorithm Based on DCT Coefficients Rearranged By Wavelet Structure
Wang Guohua;Chen Hong;Yu Yibiao;Rui Xianyi
..............
page:100-102
The Power Control of CDMA and System Simulation in MATLAB
Zhang Bo;Liu Lan
..............
page:103-104,107
An Analysis of Routing Protocol for Wireless Ad hoc Network
Lv Linjie;Liu Lan
..............
page:105-107
2006 nian quan guo kai fang shi fen bu yu bing xing ji suan xue shu hui yi zheng wen tong zhi
..............
page:108