Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2007 Issue 4
Design and Implementation of a Database Disaster Backup/Recover System Based on Internet
ZHANG Jianwei;LIU Xiaojie;LI Tao;LU Zhengtian;HU Xiaoqin;ZHAO Kui;LI Ruiyu
..............page:69-71
Analysis of Wireless LAN Security Technology and Weakness
ZHENG Yong;XIE Yongqiang
..............page:66-68
A Message Direction-Dependent Mobile Station State Transition Scheme
SHI Hongkui;RONG Mengtian;HUANG Lei
..............page:60-63
Second-order Fast Convergence Distributed Power Control for TD-SCDMA
LI Puxin;LUO Zhinian;ZHANG Wenjun;JIN Yuanyuan
..............page:56-59
Hardware Implementation of Encoder for Quasi-Regular LDPC Codes
YI Yan;SHEN Min
..............page:54-55,59
The Implement of HF-Email
GU Fang;ZOU Shengtang;LV Ming
..............page:52-53
Error Control Video Coding For Mobile Real-time Video System
LI Dong;ZHANG Huisheng
..............page:49-51
A Recognition Method of the Interference Signal in GSM
HUANG HongBing;CAO Dun;WU ZhiMing
..............page:47-48,51
The FPGA Implement of Fast Encoding for Turbo Product Codes
SUN Linan;WANG xuedong
..............page:44-46
The Method to Improve UTOPIA L2 Interface Bandwidth
YU Hui;YANG SuMei
..............page:42-43,46
New Products
..............page:38
Industry Events
..............page:4-6
Expectation and Progress of Information Security Certification
cui guang yao ; li xue
..............page:7-9
Real Protection of Virtual Property
BAI Jie
..............page:10-11
Cell Phone Virus: "the Quiet before the Storm"?
hu xiao he
..............page:12-14
The Data Restoration Market Goes Faster
HU Xiaohe;Cui Guangyao
..............page:15-16
Key Technology In Information Security Risk Assessment
NIU Xuming;LI Zhiyong;GUI Jianyong;GENG Zhengguo
..............page:17-20
High-end Combination of Cipher and Storage
YU Jue
..............page:23-24
IBM: Services Building Innovative Road
YU Jue
..............page:25
Cause to Seek Innovative Breakthroughs
CUI Guangyao
..............page:26-27
RSA Development Strategy Released in 2007
CUI Guangyao
..............page:27
Popular Mobile Digital Copyright Protection
CUI Guangyao
..............page:28
Sonic Wall Deeper into China Market
Cui Guangyao
..............page:31
From Security, Application-oriented
..............page:32-33
Design of a System for Hole Detection Based on Middleware
JIN Yi;CAI Mian;WANG Yajun
..............page:77-78,80
Based on ARP Agreement Attack and Guard Measure
GAI Linyun;TAO Fei
..............page:79-80
Research on Security Architecture in E-Commerce System
LAN Lina;LIU Xinyue
..............page:84-86
The Contrast Analysis of Two Kinds of Cryptography Middleware Module PKCS#11 and CSP
LIU Gang;LI Zheng;SI Jianmei
..............page:87-88
Research on the Security and the Tactic of RFID
Ye Lisha
..............page:89-92
Strategic View on the Industrial Integration
Cui Guangyao
..............page:1
Quantum Message Authentication Scheme Based on the Shared EPR Entangled States
SHAO Bowen;OU Haiwen
..............page:111-112,115
A scheme for Authentication and Registration in the HMIPv6 Integrated with AAA
ZHANG Xiaofan;LIU Yanming;LI Xiaoping;DONG Qingkuan
..............page:116-119
Mathematical Modeling and System Simulation of Airborne Data-link
CAO Peng;LI Huacong
..............page:123-125
Unified Policy Management System and General Rule of Security Product
GAO Min;QIU Weidong
..............page:99-102
The Principle and Prevention of SSL Man-in-the-middle Attack
JIA Jing;XUE Zhi
..............page:103-105
The Implementation of Encrytion Module Based on the Circuit of PDA
XIAO Lisheng;ZHU Shaowen;LI Zhongzheng;HUANG Zhi
..............page:106-107,110
Statistical Analysis for Evaluation Methodology of Fingerprint Sensor
XU Na;ZHANG Demin
..............page:108-110