Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2007 Issue 6
UDP-based Reliable Data Transfer Protocol for Satellite Networks
WAN Guofu;LIU Guiquan;LIU Pengxi
..............page:64-66
A Framework of Active Network Prevention System Based on Attack Monitoring Rules
Qi Xiangqian;YANG Huaizhen
..............page:155-157
The security actuality and reflection of the tax information
LIN Hongying
..............page:158-159,162
Study on security solution of online supermarket
SHI Chen
..............page:160-162
Trend and Policy on Network Security
TANG Liuhua;WANG Ying;DU Zhong
..............page:163-165
Research on Authorization Service Platform in Application System-Oriented Architecture
Wu Yiyuan;Xu Shengwei;Chi Yaping;Fang Yong
..............page:166-168
Audio Steganalysis Based on Independent Components Statistics
GAN Xinfu;GUO Li
..............page:169-170,173
A Blind Watermarking Algorithm Based on the Relationship of Coefficients in DWT Domain
BAI Mei;WANG Huiqin;DU Gaofeng;MAO Li
..............page:171-173
A Mobile Bank implementation based on K-Java
YANG Xianlei;LIUJie;FAN Chunxiao;WU Yuexin;ZOU Junwei;HAN Feng
..............page:174-175,178
Data Replication Based on Incremental Log
YAO Heng;XUE Zhi
..............page:176-178
Research On A New Type DDoS Attack
YAO Yixiong;LIU Ying;WU Zhijun
..............page:179-181
A Novel Variable Step-Size Adaptive Filtering Algorithm Based on Fuzzy Inference
WANG Shuen;SONG Yan;WANG Meng;DAI Lirong
..............page:73-76
Rake Receive Technology in HF Spread Spectrum Communication
ZHANG Yonghong;YANG Chunlan
..............page:77-80
Improvement of Resources searching Algorithm on P2P
ZHANG Shenghua
..............page:81-82,85
Speech Recognition Using GDTW and SVM
PANG Xiongchang;WANG Zhe
..............page:83-85
Resource Scheduling for Relay-Enhanced Cellular Networks
HUANG Lei;RONG Mengtian
..............page:86-88
Analysis and Research on VoIP Protocol
ZHANG Peng;ZHANG Jitang
..............page:89-91,93
Discussions on A class of New haotic Stream Cipher
XIE Bangyong;WANG Deshi
..............page:92-93
Design and Implementation of a DPI-Based P2P Traffic Control System
TANG Hao;LI Zhitang
..............page:94-96,99
Application of scrambling code
WU Zhenyan;FU Haiyang
..............page:97-99
Performance of MLC-STBC Using 8PSK Modulation in Rayleigh Fading Channels
WANG Xiangjiao;ZHANG Jie
..............page:100-101,104
Wavelet Transform-based Denoising Approach and Its Application
GAO Zhifang;ZHANG XinJia
..............page:102-104
Potential Dangers and Preventive Measures of E-bank
HAN Xinfeng
..............page:105-106,109
Steganalysis of images and its application in Internet Content Security
CAO Zhen;LI Jianhua
..............page:110-112
Research on the Information Security Management in Enterprise
LIU Renyong;WANG Weiping
..............page:113-115
The Application of Trigger and IP in Implementing Database Security Based on B/S Frame
CHEN Yao;TANG Hong;LIU Huiying
..............page:133-135
Design and Implementation of TPM Security Chip
FAN Yajun;LIU Jiuwen
..............page:136-137,240
Challenges and Countermeasures on Information Security
MA Maodong;YANG Hongmei
..............page:138-140
Intrusion Detection System Based On Protocol Analysis
LOU Liang;XUE Zhi
..............page:141-143
Using Blind Signature to Protect 3G Location Privacy
PENG Miao;CHEN Kefei
..............page:144-147
Principle and Implementation of the Monitoring in Switching Network
LI Dan;ZHAO Gang;LIU Ling
..............page:150-152
Design and Implementation of A Novel Authentication Code Based on Database Technique
DONG Fuguo;WANG Pingqin;WANG Zhixiao
..............page:153-154
Research on the Complexity of TD-ERCS Chaotic System
TAN Guoqiang;SUN Kehui;SHENG Liyuan
..............page:182-183,186
An Image Information Hiding Algorithm Based On Chaotic Permutation
XIE Xie;LUO Zujun;WANG Hui
..............page:187-188,191
AES-based Password Authentication Technology
LI Wenjin
..............page:189-191
Research on Anti-scanning Technique of Linux System
ZHAO Tianfu;ZHOU Danping
..............page:192-194
Algorithms of Finding Low Degree Annihilators of Boolean unctions
JI Huifang;MING Yongtao;LIU Wenfen
..............page:198-199,202
Application of Greylisting in the E-mail System
LIANG Xuesong
..............page:116-117
Research on Security Principle of RADIUS Protocol
LAN Lina;SHI Ruisheng
..............page:118-120
Design of Evaluating System for Secure Operating System
CHANG Weihua;CAI Mian;WANG Yajun
..............page:121-123
ACSP Development Framework for Authentication Protocols
CHEN Hua;FU Xiaoqing
..............page:124-125,128
Applying Wireless Honeypot to Deception-in-Depth
LI Juan;XUE Zhi
..............page:126-128
FPGA Implementation of MD5 Algorithm
CHEN Song;HUANG Wei
..............page:129-130
Digital Watermarking Method in Mixed Spatial Transform with Chaos Scrambling
LIN Peng;LIU Quanzhong;ZHANG Erhu
..............page:131-132,135
Configuration and Analysis of Sampling Sequence
WANG Jinling;YANG Na;YANG Zhanqiang
..............page:234-236
tong xin ji shu zheng gao
..............page:插1
Research on BGP of cross Autonomous System based on MPLS VPN
LIN Xiaoyong;CHENG Jizhen;WU Mingwei
..............page:53-55
Research on Error Resilience in Video Communication
ZOU Dajun;LIU Zhiguan
..............page:51-52
Design and Realization of A Voip System Based on SIP
FENG yan;LIU fang;WU Keke
..............page:48-50
A Research on MPLS Switch Architecture Based on ATM
LI Jian
..............page:43-45
ISDN Dial-Backup Technology and MPLS-VPN
HE Jianlin
..............page:41-42,45
Signal Analysis Based on A Synthetic Method of Wavelet Transform and Fourier Transform
PAN Mingzhong;LV Xinhua;ZHANG Libo;WANG Peng
..............page:62-63
A BER Simulation Of DSSS Communication Based On Digital Chaotic Sequences
JIN Guanglang;SONG Maozhong
..............page:60-61
Efficient Perceptual Weighting filter of Wideband coding
ZHU Min;ZHU Xiaokang
..............page:58-59
Optimization Design of G.729 Encoder Based on the Platform of PNX1500
ZHANG YingJuan;LUO Yuping;LI Zhengdong
..............page:56-57
Digital Watermarking Algorithm Based on Double Chaos Map
YUAN Deming
..............page:217-219
Kernel operator Library Based Dynamic Algorithm And Its Implementation
YU Shusi;WANG Yigang
..............page:220-221,225
Digital Image Hiding Method Based on Chaotic Sequence
LI Peng;TIAN Dongping;ZHANG Nan
..............page:222-225
Forward Secure Tamper Resistance in Audit Logs
JIN Ran;WANG Qingxian
..............page:228-230
Generalization of Schnorr Blind Signatures and the Security Analyses
CHEN Hua;CAI Guangxing
..............page:231-233
Venusteck makes UTM Simple
cui guang yao
..............page:28
The Key Management System based on Identity Algorithm and CPK Authentication
ZHAO Xiaowei;WANG Shaobing
..............page:200-202
Research and Implementation of System of Service Online Migration
ZHANG Zhongmin;SONG Ping;YANG Keli
..............page:203-205
Distributed model of intrusion detection system based on immunology
ZHONG Yong;XUE Zhi
..............page:206-209
Prevention and Defense of DDoS Attack in IDC
ZHOU Huaqiang;GUO Congliang
..............page:210-211,214
A New Scheme on Penetrating of Inter-domain Routing
ZHAO Weijie;ZHU Peidong;CAI Kaiyu
..............page:212-214
In-depth Security,In-depth Service
wu hong zhong
..............page:33-34
Travel by Anti-fraud Flight of On-line Banking
hua dan
..............page:32
Juniper Published IDP4.1and ScreenOS 6.0
cui guang yao
..............page:31
I-Security Desktop Security Management System Available
cui guang yao
..............page:31
Whose Fists Tougher in Terminal Security
cui guang yao
..............page:29
Security Realm Should Take Initiative in Pursuit
yu zuo
..............page:24-25
What to Do with ISS Belonging to the IBM
cui guang yao
..............page:22-23
Grid Security Analysis and Practice
CHEN Jie;ZHU ShiXiong
..............page:18-21
Construction of Survivable Network System
LI Hongmin;LING Ronghui
..............page:15-17,21
Cyber Security and Trust Logic
nan xiang hao
..............page:13-14
Industry Events
..............page:4
Great Minds Mature at the Time of Change
cui guang yao
..............page:1