Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2007 Issue 11
Text Region Localization and Extraction for Animation Filtering
LUO Hong-gang;WANG Shi-lin;NI You-sheng;LI Sheng-hong
..............page:66-67,70
Application-Oriented Data Model of Unified Authorization
ZHAO Dong-zhou;XU Sheng-wei;CHI Ya-ping;FANG Yong
..............page:68-70
Remote OS Identification Based On TCP Options
LIU Ying;XUE Zhi;WANG Yi-jun
..............page:71-72
Model and Analysis of Dual Signature in SET Protocol Based on Petri Nets
XIONG Dan-dan;XUE Zhi;WANG Yi-jun
..............page:73-74,77
Transparent file encryption technology and its application
CHEN Shang-yi
..............page:75-77
Work Mechanism of computer Virus and Preventive Measures
HAO Wen-jiang
..............page:25-27
Improving SSL/TLS protocol using double-certificate mechanism
LI Xiao-feng;ZHAO Hai;ZHOU Yan;NING Xuan-jie
..............page:22-24,27
Expansion of Infosec Connotation and Extension
CUI Guang-yao
..............page:1
Industry Events
..............page:4-6
Hierachical Protection, A Trump Card of Information Security
LI Xue;CUI Guang-yao;BAI Jie;HU Xiao-he
..............page:9-17
Research on Framework of Safe File Access Control in Linux
HE Li-hong;HOU Tie-cheng
..............page:86-88
Research on Internet Digital Copyright Topic
ZHOU Xiao
..............page:89-91
An Overview on Identity Management
NI Liang;HAN Zhen;HE Yong-zhong
..............page:78-81,85
A New Threshold Signature Scheme without a Trusted Dealer
GAO Feng-xiu;WEI Fu-shan;Huang Gen-xun;He Bin
..............page:82-85
Analysis and Research on the Security of Internet Payment System
TAN Bin;XUE Zhi;WANG Yi-jun
..............page:61-62,65
Study on the Secure Communication Technology of Skype and QQ
DUAN Bing;GU Da-wu
..............page:58-60
Anomaly Detection Model Based on System Call of Windows System
ZHANG Ming-lei;SHAN Rong-sheng;LI Xiao-yong
..............page:56-57
Techniques of Detecting Phishing Sites Based on Browser
LIANG Xue-song
..............page:53-55
Study of Web2.0 Value-added Service Secure Operation Support System
GU Yong;QI Ka-yue;CHEN Jian-bo
..............page:51-52,55
Strategy for Enhancement of Linux Security
CHU Zhen-lin
..............page:49-50
SOAP Compression Method for Improving Network Performance
ZHENG Ying;CHEN Huai-min
..............page:43-45
Three Steps for Features Enhancement of UTM Security Gateway
CHEN Sheng-quan
..............page:38-39