Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2007 Issue 10
On Two-dimensional Editing Generator
WANG Jin-ling;CHEN Zhong-bao;LIU Zong-cheng;WANG Juan
..............page:82-84
Researches on generation of Montgomery form elliptic curve
GUO Gang;ZENG Guo-ping
..............page:85-88
An Information Security Evaluation Method Based on Rough Set
LI Jun;XUE Zhi
..............page:89-91
A Simple and Practical Multi-secret Sharing Scheme
CHEN Gui-qiang;LI Yu-jian;WANG Li-qin
..............page:92-94
A Forward-secure Multisignature Scheme based on ElGamal Type
LUO Li-ping;NONG Liang-qin
..............page:95-97
Study on Information System Architecture based on VSM
LUO Jian
..............page:98-100
Security Times, Mix-together for Change
CUI Guang-yao
..............page:1
Infosec Says Goodbye to "Solo-dance Epoch"
CUI Guang-yao;HU Xiao-he;LI Xue;BAI Jie
..............page:8-16
Thoughts on Endowments Certification for Infosec Service in China
CHEN Xiao-hua;ZHAI Ya-hong
..............page:19-21
SSL Protocol and Its Application
LI Xiao-feng;ZHAO Hai;ZHOU Yan;NING Xuang-jie
..............page:22-25
Wondersoft: Intranet Security is a Place of Unique
HU Xiao-he
..............page:28-29
IDS and IPS will Coexist for a Long Time
BAI Jie
..............page:30
Review of Legendsec's Touring Show in One Hundred Cities of China
CUI Guang-yao;LI Xue
..............page:31-32
Hifn,A New Step of China Market
BAI Jie
..............page:35
Websense Forms an Alliance with Digital China
CUI Guang-yao
..............page:37
Trusted Computing and Controllable Security
TAN Xing-lie;DONG Gui-shan
..............page:42-45
Security Situation Real-time Control
..............page:49-50
CofferDisk Intranet Security System
..............page:51
Analysis and Implementation of RSA Algorithm
BU Shan-yue
..............page:80-81
Design and Implementation of Tracing System to Courseware Learning Process
XIAO Yong;ZHANG Xin-jie;YAO Jun
..............page:76-79
Research on RTP Stream Attack and Security Mechanism
WANG Yi;CHEN Kai;YU Jing
..............page:74-75,79
Defend against Pharming Attack
LUO Cheng;XUE Zhi;WANG Yi-Jun
..............page:71-73
An Integrated Way to Filter Spam In Campus Net
HUA Xiao-Peng;LAN Shao-Hua
..............page:69-70,73
Design and Implementation of VoWLAN Monitor System
LIU Yu-jie;SONG Yu-bo;PEI Wen-jiang
..............page:66-68
The Model of Net Once One Password based on Server Dynamical System Time
YANG Yu-qi;PAN Rui-jie
..............page:63-65,68
Research and Improvement on EAP-AKA
ZHANG Shu-bin;SUN Hao;WU Yue
..............page:60-62
Design of Soft Dog against Pursuing Based on USB Interface
ZHANG Jian-jun;DU Li
..............page:58-59,62
Research on Adaptive Macroblock Encoding Algorithm based on H.264/AVC
LI Lei;HUANG Deng-shan
..............page:53-54
Industry Events
..............page:4,7