Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2007 Issue 1
365 tian ,360 de nei rong an quan fang hu
xie xu dong
..............page:20
Functions about Network Manager
Tan Yushan;Jiang Furong
..............page:82-84,86
Optimal Jamming of FH Synchronous Signals
Zheng Xiaoli;Jiang Digang
..............page:85-86
Research on Performance of CARD Architecture for Resource Discovery in Wireless Sensor Networks
Liu Zhiqiang;Jang zejun;Wang Lifang;Wang Junji;Wang Gaozu;Jang Hua
..............page:87-89
Design of Tuning High Frequency Amplifier Circuit in the Frequency-hopping Radio
Peng Xiaofeng;Lei Li;Zhang Li
..............page:93-95
Study of Cache Mechanism Improving in MIP Handover
Yang Wenchao;Jia Shilou
..............page:96-98
Apply NIDS Technology to Detect Polymorphic Shellcode Evading
Chen Yue;Xue Zhi;Wang Yijun
..............page:99-103
Research of Wireless LAN Security
Zhu Meng
..............page:104-108
Internet Fraud and Defense System Research
Zhang Zhenling;Li Jianhua
..............page:109-110,113
Design of Firewall Hardware Flat Based On IXP425
Zhao Kai;Jia Yutao;Wang Dan
..............page:111-113
juniper" shi nian " zhi shu
ding zhao lie
..............page:22
check point de an quan zhi lv
zeng zhi ming
..............page:22-23
2007, qi ye ying yong an quan yu jia su yuan nian
yang ma xiu
..............page:23
ying yong yan zhan ying jie xin de fei yue
wang hao
..............page:24
sonicwall, mang bing kuai le zhuo !
tan dun min
..............page:24-25
gui fan shang wang xing wei ti gao jing zheng li
lian bang jun
..............page:25
ironport: wei jiao tu pian la ji you jian
li song
..............page:26
jia su qian jin zhong de cp secure
shi wen hong
..............page:26-27
Expect For "More Secure"
Bai Jie
..............page:29-30
Legendsec's Program Came From Blue Sea
Cui Guangyao
..............page:35-36
Legend Hong Technology Co. Ltd,Over the Safety Net Program Management Card
Hu Xiaohe;Cui Guangyao
..............page:37-38
SSL VPN: Outstanding Network Gatekeeper
wei shi tong xin xi chan ye gu fen you xian gong si
..............page:39-40
Chinasec Construct Grading System for Protecting Classified Network
bei jing ming chao wan da ke ji you xian gong si
..............page:43
Risk Valuation of the Assets of some Conceptual Issues
Yu Lixin
..............page:46-47
Campus Internet Access Risk Management
Zhao Wei
..............page:48-51
jian xin 2007 jin ru di yi ti dui
huang zuo shao
..............page:20
an quan geng duo di zhuan xiang xin ren he jiao hu
guo zun hua
..............page:19
ibm, zuo zui hao de zi ji
xu ying
..............page:18-19
tong yi he jian hua it guan li
xie chun ying
..............page:18
Virtual Advantage
Erik Giesa
..............page:55-56
Protect Suppliers of Network Security "Superman Rules"
juniper wang luo gong si
..............page:56-57
Research of Vulnerabilities Detection Technology Based on Rough Set Theory
Gao Jingfeng;Lin Bogang;Ni Yitao
..............page:63-65,68
Sensitive Information Filtering Model Based on Web Mining
Duan Lijuan
..............page:69-71
Optimization of H.263++Encoder Based on the Platform of PNX1500
Li Zhengdong;Zhong Xuefeng;Qin Tingting;Luo Yuping
..............page:72-73,76
Research Development and Network Application of SHDSL Technology
Cheng Jizhen;Lin Xiaoyong;Shao Yuanyuan;Jin Wei;Xia Jian
..............page:74-76
Image Pretreatment Using Scaling Algorithm in FPGA
Zhang Yi;Feng Fei;Song Guanqun
..............page:77-78,81
Design and Implementation of Distributed Cable Testing System Based on DCOM
Zhou Xin;Wu Jian;Zhou Wei
..............page:79-81
A Methodology to Prevent Distributed Denial-of-Service Attacks
Zhang Shaojie
..............page:114-116
Theory and Practice of Power Analysis Attacks
Li Ding;Lv Yongqi
..............page:117-118,121
chen jing zhi zhong , xu shi dai fa
yan wang jia
..............page:10
2006 Veterans Who are in the Brand Security
Li Xue;Hu Xiaohe;Bai Jie
..............page:9
It is Blowing up for Rain
Cui Guangyao
..............page:7-8
Information Security System to Make Substantive progress
Cui Guangyao
..............page:2-3
Winter Solstice Concealed,Long-Road
Cui Guangyao
..............page:1
Constructing the Safe Defensive System of E-government
Liu Jing
..............page:119-121
Study of WLAN Security
Wang zhijia;Xie hao
..............page:122-124
Alternate Encryption Based on Two-dimension Hyperchaos Sequence
Huang Aimei;Li Xin;Ma Baoyan
..............page:125-126,130
Application of PKI in Distributed Firewall System
Fu Xiaoqing;Wan Yong
..............page:127-130
A New Methodology of Detecting System Level rootkit
Hu Qiuwei;Xue Zhi
..............page:131-133
Application of AES on Identification System
Chen Chang;Cao Juan
..............page:134-135
Prevention of Virus in Smart Phone
Sun Jian;Di Xiang
..............page:136-138
A Study about Secret-involved Information System Risk Evaluation and Security Testing Evaluation
Liu Yulin;Wang Jianxin;Xie Yongzhi
..............page:142-144,147
Study on the Technology of Trojan's Penetration Through Personal-firewall
Song Liusong;Wu Shaohua;Zhou Anmin
..............page:145-147
Application of ALOHA Algorithm in Anti-collision of RFID
Wang Hongju;Zhang Jie;Xu Tingting
..............page:148-150
Robust Blind Watermarking for Gray and Color Image
Luo Jian
..............page:151-152
Design of CSP Based on USB and SD Interface Smart Card
Lou Xiaojin;Chen Gongliang;Yang Shutang
..............page:153-155
Method to Improve IP Layer's Throughput Base on END Driver
Yang Hong
..............page:156-157,160
Application of WSRBAC in Management Information System
Qiao Deji;Tang Hong;Liu Huiying
..............page:158-160
A Note on the OR-Composition of Σ-protocol
Cheng Dengfeng;Chen Gongliang;Zhang Miaomiao
..............page:161-163
Some Experience of Intranet Information Security Management
Ren Haixiang
..............page:164-165
The Network Safety Analysis
LI Dong
..............page:166-168
nexcom cheng gong zhe bei hou " an jing de zhi chi zhe "
lin xian ming
..............page:16
nei wang an quan shi chang zhu jian cheng shu
sun guo zuo
..............page:15-16
bao chi ping heng xun qiu tu po
li yan zhao
..............page:15
chan pin qu xiang zhi neng hua
li xue chun
..............page:14
zhong xing : chuang xin zhe ying
liu xiao yu
..............page:14
sha du ruan jian shi chang mian lin yan jun tiao zhan
wang quan guo
..............page:13
sheng an , fu ze ren di zuo an quan
lei ji cheng
..............page:13
2006: yong hu " jian she nian " qi ye " diao zheng nian "
ren zeng qiang
..............page:12
tian rong xin , wo " xin " wo xing
jin yu dan
..............page:11-12
xu qiu geng li xing chan pin geng wan shan
qi jian
..............page:11