Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2006 Issue 5
How to Construct the Secure Network of Electric Power
Ma Chunlei
..............page:61-63
KOAL: Responsibity Recognized System
ge er ruan jian
..............page:67
Design of Streaming Media DRM System
Zeng Wenming
..............page:69-71,74
Compare of DBMS Security in Oracle and Sybase SQL Server
Zhao Wei;Li Zhengzhong
..............page:72-74
Analysis and Research of Web Services Security
Xie Jialong;Qiu Weidong
..............page:75-77,80
The Analysis of American Information Security Research Priorities
Xu Zhijun;Chen Gongliang;Liu Yunxia
..............page:78-80
The Protective Deity of Enterprises' Intranet Security Administration System
bao ji shi you ji xie you xian ze ren gong si
..............page:58-59
The Research of Data Security Based on E-commerce
Ren Jinian;Liu Shan;Wang Shilun
..............page:51-53
an quan wen ding zui zhong yao
tan zuo
..............page:50
na zhong vpn geng an quan
hu fang
..............page:50
Neusoft Network Security Develops with Depth
Cui Guangyao
..............page:24-26
Legend Net Defense Surfs in the "Blue Sea"
Cui Guangyao
..............page:27-28
Growing up with Self- Confidence
Hu Xiaohe
..............page:31
Industry Events
..............page:4-6
30% Technology, 70% Management
Guan Hu
..............page:39-40
Design of Email Filtering System Based on Approximate Category Classification
Zhou Risheng;Xie Haiguang;Ling Xiang;Li Shenghong
..............page:81-83
The Research of Network Intrusion Detection Systems
Hu Hongyu;Ai lingxian
..............page:84-85,89
Implementing RBAC for XML Documents with RDF
Zhang Rui;Chen Jianbo;Qi Kaiyue
..............page:86-89
The Research and Implementation of SOCKS VPN
Liu Song
..............page:90-91
How does the Network-based Intrusion Detection System(NIDS) Function
Wang Yujia;Wu Quanbo
..............page:92-94
Research and Design the Secure Micropayment System Based on Digital Products
Wang Yan;Song Dianxia;Chen Haigang
..............page:95-97
A Scheme of Wavelet-based Digital Watermarking Use FICA Extract
Liu Yinjie;Ma Yide;Luo Xueping
..............page:98-100
Watermark Embedded Algorithm Based on FRFT
Fan Peng;Zhang Hongyu
..............page:101-103
The Improvement 3G Authentication Protocol Based on Public Key Cryptosystem
Lai Xin;Ruan Zhigang;Peng Daiyuan
..............page:104-105
IP Security-Still Secure?
Dong Rui
..............page:11-13
PKI' Deployments in Network Access Control Application
Long Yihong;Li Dan
..............page:16-19
Information Security: Excellent Company with 10 Years Stands out
Song lina;Cui Guangyao
..............page:20-23
Cryptography Applications Based on Ergodic Matrices and It's One-way Trapdoor Function
Zhou Xiaoyi;Zhao Yongzhe
..............page:106-107,111
A Network Management Model Based on Policy and Active Network Technology Combination
Xu Dongsheng;Yuan Feiyun;Zhao Zhengwen
..............page:108-111
A Survey of Medium Access Control Protocols for Mobile Ad Hoc Networks
An Hongzhang;Xie Shangming
..............page:112-115
H.264 Standard and Satellite Video Applications
E Zhidong
..............page:116-118
Security Framework for Multi-Agent System Based on Distributed Trust Management
Qu Yingwei;Zheng Guanghai
..............page:119-121
Who is in Charge of the VPN Market?
Li Xue
..............page:42-43
zhi li ssl vpn de ying yong tui guang
wu ruo song
..............page:45
si zhong ji shu zhi cheng vpn
huang wei
..............page:45-46
du te you shi shou qing zuo
ao tu ke ji
..............page:46-47
vpn de liu da fa zhan fang xiang
zhang yan
..............page:47
wei lai wang luo fa zhan de zhong yao fang xiang
wang hong zhi
..............page:48-49
ji yu ipsec he ssl xie yi de vpn qu yu rong he
ye yi bin
..............page:49
Looking For the Blue Sea of Information Security
Cui Guangyao
..............page:1