Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2007 Issue 10
On Two-dimensional Editing Generator
WANG Jin-ling;CHEN Zhong-bao;LIU Zong-cheng;WANG Juan
..............
page:82-84
Researches on generation of Montgomery form elliptic curve
GUO Gang;ZENG Guo-ping
..............
page:85-88
An Information Security Evaluation Method Based on Rough Set
LI Jun;XUE Zhi
..............
page:89-91
A Simple and Practical Multi-secret Sharing Scheme
CHEN Gui-qiang;LI Yu-jian;WANG Li-qin
..............
page:92-94
A Forward-secure Multisignature Scheme based on ElGamal Type
LUO Li-ping;NONG Liang-qin
..............
page:95-97
Study on Information System Architecture based on VSM
LUO Jian
..............
page:98-100
A New Trend of Information Security Technology Focus on End User Protection
LI Ming-ji
..............
page:101-102
Security Times, Mix-together for Change
CUI Guang-yao
..............
page:1
Bring Informatization into Full Play in Adjustment of Economic Structure
BAI Jie
..............
page:2
Start with Legislation Consciously Standardize Web People's Actions
..............
page:3
Solution for Network Security Requires the Follow-up of Legal Environment
..............
page:3
Infosec Says Goodbye to "Solo-dance Epoch"
CUI Guang-yao;HU Xiao-he;LI Xue;BAI Jie
..............
page:8-16
Raise the Banner of Law, Suppress the Malicious Program
BAI Jie
..............
page:17-18
Thoughts on Endowments Certification for Infosec Service in China
CHEN Xiao-hua;ZHAI Ya-hong
..............
page:19-21
SSL Protocol and Its Application
LI Xiao-feng;ZHAO Hai;ZHOU Yan;NING Xuang-jie
..............
page:22-25
Nokia's Senior Manager Talks about the Progress of Cooperation with Neusoft
CUI Guangyao
..............
page:26-27
Wondersoft: Intranet Security is a Place of Unique
HU Xiao-he
..............
page:28-29
IDS and IPS will Coexist for a Long Time
BAI Jie
..............
page:30
Review of Legendsec's Touring Show in One Hundred Cities of China
CUI Guang-yao;LI Xue
..............
page:31-32
SonicWALL Enters into Cooperative Partnership with Digital China
HU Xiao-he
..............
page:33
China-made Virus-kill Software Authoritative International Certification
HU Xiao-he
..............
page:34
Hifn,A New Step of China Market
BAI Jie
..............
page:35
Cultural Strategy Re-creats New Height for Enterprises
BAI Jie
..............
page:36-37
Websense Forms an Alliance with Digital China
CUI Guang-yao
..............
page:37
Interpret "Six Hotspots" for Collective Show of New EMC Memory Platform Products
LI Xue
..............
page:38-39
Patriot Gives First Place to Commercial-use King Memory Leading Sub-classification of Products
..............
page:39
Examine the Importance of Identity Authentication from the Manager's Angle
YANG Fu-xin
..............
page:40
RSA enVision Helps Large Chain-stores Realize the Trade Regulations Compliance of Paying-cards
..............
page:41
Trusted Computing and Controllable Security
TAN Xing-lie;DONG Gui-shan
..............
page:42-45
Legendsec Helps Golden Tax Project in Buileling up Information Security
..............
page:46-48
Security Situation Real-time Control
..............
page:49-50
CofferDisk Intranet Security System
..............
page:51
Analysis and Implementation of RSA Algorithm
BU Shan-yue
..............
page:80-81
Design and Implementation of Tracing System to Courseware Learning Process
XIAO Yong;ZHANG Xin-jie;YAO Jun
..............
page:76-79
Research on RTP Stream Attack and Security Mechanism
WANG Yi;CHEN Kai;YU Jing
..............
page:74-75,79
Defend against Pharming Attack
LUO Cheng;XUE Zhi;WANG Yi-Jun
..............
page:71-73
An Integrated Way to Filter Spam In Campus Net
HUA Xiao-Peng;LAN Shao-Hua
..............
page:69-70,73
Design and Implementation of VoWLAN Monitor System
LIU Yu-jie;SONG Yu-bo;PEI Wen-jiang
..............
page:66-68
The Model of Net Once One Password based on Server Dynamical System Time
YANG Yu-qi;PAN Rui-jie
..............
page:63-65,68
Research and Improvement on EAP-AKA
ZHANG Shu-bin;SUN Hao;WU Yue
..............
page:60-62
Design of Soft Dog against Pursuing Based on USB Interface
ZHANG Jian-jun;DU Li
..............
page:58-59,62
Research of Fiber Propagation Model Using Computer Simulation
WANG Fan
..............
page:55-57
Research on Adaptive Macroblock Encoding Algorithm based on H.264/AVC
LI Lei;HUANG Deng-shan
..............
page:53-54
One-key Physical Isolation Card for Graphs and Texts
..............
page:51
Industry Events
..............
page:4,7