Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2007 Issue 5
Exploring the Changing Thread of Information Security
BAI Jie;LI Xue;HU Xiaohe;CUI Guangyao
..............page:9-16
On the Turning Point in Pursuing Development Opportunity
CUI Guangyao
..............page:7-8
Discussions on Ethical Issues in Information Systems
ZHANG Jian
..............page:84-85,89
Application of 802.1x Protocol in LAN Security
ZHU Xingguo
..............page:86-89
Security Design of the Educational Administration System of Graduation Project Based on WEB
LI Zhangbing;LIU Jianxun;GONG Bo;ZHAO Yijiang
..............page:90-92
An Enhanced Role-based Delegation Model
HUANG Xiaoming;JIANG Xinghao;LI Lan
..............page:93-95
Introducing the Chaos Cryptography Technology into the Security of FTP Server
XIAO Jie;LIN Tusheng
..............page:96-97,100
Application of E-Business With A Security Technology Based on SAML
LIN Chengji;ZHANG Baowen;XUE Zhi
..............page:101-103
Research of Evaluation System for Secure OS Based on CC Criteria
JIN Yi;CAI Mian
..............page:104-106
A Research on Waterwall Technology
LI Wenjian
..............page:107-108
Analysis of Attack and Recovery Techniques on E-commerce Network Sites
LV Qiuyun;ZHAO Zemao
..............page:109-111,114
A Kind of Immune Algorithm Based on Multilevel Detection and its Improvement
ZHANG Feng;ZHU Yanqin
..............page:112-114
Analysis on the Intranet Security of Tianjing Port Co,LTD
YANG Ning
..............page:115-117
China's Public internet Security Situation Is Worrisome
CUI Guangyao
..............page:17
Pratice on Internet Security Application
Wang Chunlei
..............page:40
SOX、Audit and Venustech
TANG Qi
..............page:41-42
On-line Banking, No Bypath for Security
YU Huazhang
..............page:43-44
Gray List Wipes Off Spam
..............page:45-46
Product Descriptions of SafetyBase
..............page:50
Research on Next Generation Avionics Data Networking
SHI Gaihui;ZHANG Yuan;LI Da
..............page:51-52,55
Efficient Timing Mechanism Analysis and Its Vxworks Realization
QI Jin;CHEN Yuyan;KANG Min
..............page:53-55
Coding & Decoding Method and Programming of SMS Based on GSM
XU Yanqi;LIU Yajing;HUANG Dengshan
..............page:56-58
A Radio UWB System for Sensor Network Application
XIONG Jun;LI Yong
..............page:59-61
A Contact-based Architecture for Query in Wireless Sensor Networks
LIU Zhiqiang;JIANG Zejun;WANG Lifang;WANG Junji;WANG Gaozu;JIANG Hua
..............page:65-67
Theory of a High-Speed QPSK Demodulation and Its System View Simulation
XU Tingting;LI Yong;WANG Hongju
..............page:68-70
Industry Events
..............page:4-6
Information Security is an Important Opportunity
WEN Rongyou
..............page:3
Five-point Proposal to Enhance Network Security Response
JIANG Yaoping
..............page:2-3
No Slow-wittssd Cases, No Illustrious Achievements
CUI Guangyao
..............page:1
OFDM Technologies and Applications in Cognitive Radio
SHENG Huixing;FANG Zhiyuan;HUO Guanying
..............page:71-73
Improved Method of TADIL Network Synchronization Technologies
XIA Linying;ZHANG Yaming;CHEN Shaowei
..............page:74-75
Research of High Density Sensor Network Routing Algorithm
ZHANG Xin;PAN Li;LI Jianhua
..............page:76-78
Turbo Synchronization for MSK
HUANG Tao;BI Wenbin;ZHANG Jie
..............page:79-80,83
Research on Channel Estimation for MIMO-OFDM System
TANG Yun;WANG Ling
..............page:81-83
A Scheme for Key Management in the Secret Cell Broadcast
REN Chuanlun;LIU Fengmei;YANG Yixian
..............page:118-119,122
Implementation of Digital Signature Based on User Token in Electronic Government Construction
YU Xin;WEI Zhiguang;SHENG Hongyu
..............page:120-122
Analysis of Cryptographic Assurance About American E-Government
TAO Jianping;ZHANG Yongfu
..............page:18-20,23
Analysis on Computer Network Security Based on Architecture
GUO Zhonghua;SHI Haoshan
..............page:21-23
Study of Security and Privacy in Mobile RFID
YU Gongping;JIANG Xinghao;LI Jianhua
..............page:24-26
Verifiable Secret Sharing Scheme Based on Linear Code
TAN Xiaoqing
..............page:27-29
Infosec "Green Giants"
BAI Jie
..............page:30-31
HF Access System Based on SIP
LENG Bing;LUO Qiuxia
..............page:123-126
Security Analysis of a Key for Multicast Based on the One-way Function Tree
ZHENG Xiaoli;JIANG Di gang
..............page:127-128,130
E-Cash Module Combined with Costas Arrays
MENG Chunyu;YIN Xinchun;SONG Chunlai;LIU Tao
..............page:129-130
A Chaos Generating Circuit for Chaotic Information Security
BI Weiguang;WU Aiguo
..............page:131-132,135
SIP Authentication Mechanism Using Identity-based Cryptography
PANG Hongling;AN Ke;RONG Fenghong
..............page:133-135
Voice Information Hiding Based on Echo Hiding
LING Lin
..............page:136-138
Product Descriptions of Authenex
..............page:49
Research on Java Applications Security Analysis
GUAN Ming;ZHAO Peng
..............page:141-142,145
Research on Digital Signature Algorithms
LONG Fang
..............page:143-145
An Image Encryption Algorithm Based on Mixed Chaotic Dynamic Systems
SHAO Pengfei;WANG Ling;SUN Bai
..............page:146-148
An Image Hiding Method Based on Bit-operation
ZHANG Xuefeng;FAN Jiulun
..............page:149-150,154
Cryptographic Properties of the Camellia S-box
NING Xuejun
..............page:151-154
Implementation Technology of MPLS Load Balancing
TIAN Bo
..............page:155-157
Algebraic Attacks on Combiners with Memory
TAN Junzhong
..............page:158-160
A New Type of the Editing Generator
WANG Jinling;WANG Jing;YANG Na
..............page:161-164,167
Research on Attack-graph Based Model of Vulnerability Risk Evaluation
ZHOU Zhengwei;CHEN Xiuzhen;LIN Mengquan;XUE Zhi
..............page:165-167