Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2006 Issue 8
Firewall Technology Analysis
Wang Weiping;Chen Wenhui;Zhu Weiwei
..............page:24-27
A Fast Calculating Method for Large Data Mode Power
Xie Jianquan
..............page:22-23,27
A Brief Analysis of FIPS PUB 140-2
Wei Wenyu
..............page:28-29
The Brief Evaluations of the Candidates to the ECRYPT Stream Ciphers
Liu Yunyi;Qin Tuanfa;Ni Wansun;Zhang Shuyi
..............page:30-33
McAfee Pushes Forward the Strategy in China
Hu Xiaohe;Cui Guangyao
..............page:36-37
How does SafeNet Surmount SSL VPN
Chen Zhaoyun;Cui Guangyao
..............page:45
Design of Frequency Hopping Communication System Based on High-speed DSP
Lv Zhijun;Gao Jun;Guan Jianxin
..............page:97-99
Some Problems about Electronic Signature Law
Wang Siye;Chen Gongliang
..............page:100-101
Study of an IDS Alert Fusion and Correlation Model
Wen Ying;Hu Wei;Li Jianhua
..............page:102-104
Construction of Buffer Overflow Prevention Architecture
Wang Wei;Deng Huyu;Liu Yi qun
..............page:105-108
Research of Selection of Storage Project for Disaster Tolerant System
Xu Jia;Li Jianhua
..............page:109-111
Research an Appliance of AAA Access System for Mobile IPv6
Yao Guoxin;Gao Ling;Xu Qi
..............page:112-115
Investigation and Implementation of Wireless Key Distribution System Based on SMS
Xu Peng;Jin Weixin;Shi Yong
..............page:116-118
The Network Attacks Display New Forms
Chen Zhaoyun
..............page:61
Analysis of Security Flaw of ARP Protocol and Protecting Methods
Zhao Jun;Chen Kefei
..............page:72-74,77
An Extension of a Special Generalized Self-shringking Sequence
Dong Le;Wang Jinling;Chen Tiesheng
..............page:78-79,82
Discuss on Net-Centric Enterprise Services for NAVY Communication
Wang Xiang
..............page:137-139,142
A New Off-line Electronic Cash System Based on Trusted Third Party
Xu Lanfang;Chen Wei
..............page:140-142
Security Deficiencies of SET in Electronic Commerce
Hei Xiali;Zheng Chunli
..............page:143-145
FPGA Design of the Adaptive Equalizer
He Weiping;Zhang Huisheng
..............page:146-148
An Scheme of Digital Signature Based on Encrypt Algorithm of Irrational Number
Yuan Feiyun;Xu Dongsheng;Zhao Zhengwen
..............page:149-150,153
A Novel Proactive Defense Scheme of DDoS Attack
Song Guoming
..............page:19-21
Application Progress of Information Hidden Technology
Yang Xiuqing;Ma Weihong;Gu xin;Yang Shiyong
..............page:16-18,21
A Fast Computational Hash Function in Binary Fields
Zhang Jun;Zhou Fucai
..............page:151-153
UTM: The Final Solution of the Gateway Security
Bi Xueyao;Liu Kequan
..............page:48-49
The Application of the Firewall Mold on the Campus Network
hua wei 3com
..............page:50-52
Construct the Beneficial Network Only by One Step
zhong ke xin ye
..............page:54
Northeast Electricity Power University's Security Solution
Ma Dongshun
..............page:55-56
Research on the Hierarchical Cooperation IDS Based on Extend Message Exchange Format
Han Bing;Yang Shoubao;Shan Laixiang;Yu Xiang;Lin Xianchao
..............page:80-82
An Access Control Scheme for USB Mass Storage Device Based on ECDSA
Li Chao;Zhang Lin;Han Zhen
..............page:83-85
Analyzing the Vulnerability of Software Through Syntax Testing
Li Ming;Gao Yong;Li Xianghe
..............page:86-87,91
Mobile IP Research in VPN Networks
Li Pu;Zhou Jun;Xiao Yi
..............page:88-91
Study of Framework and Key Technology for Intrusion Alerts Correlation
Li Yaqin;Sun Chuanlin;Lei Jie
..............page:92-94
Design of a Self-governed and Intelligent Audit System of Database
Liu Jianbo;Chen Kaiming;Wei Jingzhe
..............page:95-96,99
A Hot-redundancy System Based on TCP Protocol
Tang Liuhua;Ma Yongqiang;Li Chunfu
..............page:173-175,178
A Robust Joint Transceiver MMSE Design for Multi-user Downlink Systems
Wan Hong;Xu Changqing;Li Hao
..............page:176-178
Linear Modulation and Demodulation Method Based on Sampling and Filtering
Pei Qingfei;Rao Ruohe
..............page:179-183
Network Congestion and Control of Flux
Rao Chaofu;Yang Fu
..............page:184-186
Based on C6711 Processor cdma2000 1x System Forward Channel Signal Process
Jing Sheng;Zhao Gang;Zhang Hong;Luo Yonglun
..............page:171-172
An Information Security Model Based on Fuzzy Synthesis Evaluation
Zhu Lingbo;Dai Guanzhong
..............page:13-15
Survey the Information Security on the Global View
Cui Guangyao
..............page:7-8
Sarbanes-Oxley and Information Security
Cui Guangyao
..............page:1
Adaptive Digital Watermarking Algorithm in Combinational Domain
Kang Qinqing;Wang Ling
..............page:154-155,159
A Self-Adaptive Time-Frequency Parameter Based on Mel Field
Li Jin;Wang Ling
..............page:160-161,164
The Implementation of CORBA/Q3 Gateway
Chen Yulei;Jiang Hong
..............page:162-164
Research of VLAN Configuring Technology Based on the Third Exchange
He Wenhua;Chen Zhengun
..............page:165-167,170
Spread Spectrum Technology and Its Application
Hu Wenjiang;Xu Xiaoxiao;Fang Lei
..............page:168-170
Algorithm Structure and Security of RSA Public Key Cipher System
Luo Xianggen;Xue Yanping;Liu Yimin
..............page:119-120,124
Research of Port Hopping Technology Apply to Hiding Communication
Xu Ting;Yang Lin;Ma Lingru;Li Jingpeng
..............page:125-127
Design of Network Misuse & Anomaly Intrusion Detection System
Gu Wenfei;Zhao Huanyu;Hou Wenjun
..............page:128-130
Research of Digital Audio Watermarking Algorithm Based on LDPC Codes
Zhou Qian;Yang Zhen
..............page:131-133