Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2007 Issue 11
Text Region Localization and Extraction for Animation Filtering
LUO Hong-gang;WANG Shi-lin;NI You-sheng;LI Sheng-hong
..............
page:66-67,70
Application-Oriented Data Model of Unified Authorization
ZHAO Dong-zhou;XU Sheng-wei;CHI Ya-ping;FANG Yong
..............
page:68-70
Remote OS Identification Based On TCP Options
LIU Ying;XUE Zhi;WANG Yi-jun
..............
page:71-72
Model and Analysis of Dual Signature in SET Protocol Based on Petri Nets
XIONG Dan-dan;XUE Zhi;WANG Yi-jun
..............
page:73-74,77
Transparent file encryption technology and its application
CHEN Shang-yi
..............
page:75-77
New Characteristics and Countermeasures of Computer Crime in China
CHEN Hai-yan
..............
page:63-65
Intranet Security Begins to Take Shape, Wondersoft's Superiority Gradually Comes into Being
..............
page:33
Inspur SSR Constructs Security Defence Promote Security Classification of Hierachical Protection
LIU Yuan-qing
..............
page:32
Patriot King-Memory Starts a New Upsurge of Security Popularization
..............
page:31
Meet the Challenge of Network Security High-Danger Times
YU Qin-yong
..............
page:30
"Next-Generation Security Frame" Stores up Power and Comes into Being
..............
page:28-29
Work Mechanism of computer Virus and Preventive Measures
HAO Wen-jiang
..............
page:25-27
Improving SSL/TLS protocol using double-certificate mechanism
LI Xiao-feng;ZHAO Hai;ZHOU Yan;NING Xuan-jie
..............
page:22-24,27
Security Market of the First Half Year Keeps High-speed Growth
CUI Guang-yao
..............
page:21
Expansion of Infosec Connotation and Extension
CUI Guang-yao
..............
page:1
Strengthen Network Culture Cultivation Build up Good Network Environment
zhong qing wang
..............
page:2
Comprehensively Promote Hierachical Protection of Confidential Information System
..............
page:2-3
Industry Events
..............
page:4-6
Hierachical Protection, A Trump Card of Information Security
LI Xue;CUI Guang-yao;BAI Jie;HU Xiao-he
..............
page:9-17
Informatization Security of Manufacturing Industry Should Be Put on Agenda
HU Xiao-he
..............
page:18-20
Research on Framework of Safe File Access Control in Linux
HE Li-hong;HOU Tie-cheng
..............
page:86-88
Research on Internet Digital Copyright Topic
ZHOU Xiao
..............
page:89-91
Discussion on Network Security Construction and Management for Coal Enterprises
WU Hai-jun
..............
page:92-94
An Overview on Identity Management
NI Liang;HAN Zhen;HE Yong-zhong
..............
page:78-81,85
A New Threshold Signature Scheme without a Trusted Dealer
GAO Feng-xiu;WEI Fu-shan;Huang Gen-xun;He Bin
..............
page:82-85
Analysis and Research on the Security of Internet Payment System
TAN Bin;XUE Zhi;WANG Yi-jun
..............
page:61-62,65
Study on the Secure Communication Technology of Skype and QQ
DUAN Bing;GU Da-wu
..............
page:58-60
Anomaly Detection Model Based on System Call of Windows System
ZHANG Ming-lei;SHAN Rong-sheng;LI Xiao-yong
..............
page:56-57
Techniques of Detecting Phishing Sites Based on Browser
LIANG Xue-song
..............
page:53-55
Study of Web2.0 Value-added Service Secure Operation Support System
GU Yong;QI Ka-yue;CHEN Jian-bo
..............
page:51-52,55
Strategy for Enhancement of Linux Security
CHU Zhen-lin
..............
page:49-50
Study of a New Method for Improvement of Palmprint Identification Rate
WU Pan
..............
page:46-48
SOAP Compression Method for Improving Network Performance
ZHENG Ying;CHEN Huai-min
..............
page:43-45
New Model of Juniper Integrates Access Control Solution UAC 2.1/One-key Physical Isolation Card for Craphs and Texts
..............
page:41
SSL VPN Turns C/S Application into B/S Frame
..............
page:40
Three Steps for Features Enhancement of UTM Security Gateway
CHEN Sheng-quan
..............
page:38-39
USB Key-based Protection Solution for Government Organizations Websites
LI Wei
..............
page:36-37,39
e-Government Seeks Privacy the Four Networks' Isolation solves Problems
..............
page:35
Applications of Permit Management in CAAC Software System
SHI Miao
..............
page:34