Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2007 Issue 7
The research overview of data fusion in WSN
TANG Hui;HU Xiang-dong
..............page:62-64,68
A Voice-Recognition Method Based on LabVIEW and MATLAB
SHI Jian-feng;CHANG Guo-dong;LI Zhi-gang
..............page:57-59
Shouxin Wangyouxianfeng Bandwidth Management Scheme
bei jing shou xin ke ji you xian gong si wang luo an quan shi ye bu
..............page:51
CPK Algorithm Going Abroad
GUAN Zhi
..............page:15-16
Interpret e-Government Secrets Management Guide
DU Hong
..............page:17-21
An Economic Approach to Market of Information Safety Product
MU Liang-ping;TU Fei
..............page:22-24
D-Wave Qantum Computation Progress Is Worth Notice
GUAN Hai-ming
..............page:25,28
Algorithmetic Design and Realization of Multiparty Signature Authentication
PENG Xu-fu;SHI Shu-dong
..............page:26-28
Discussion of the Invalid-keys Phenomenon in Chaotic Secrecy Communication System
Ding Wen-xia;Wang Hao;Lu Huan-zhang;Chen De-li
..............page:29-31
How to Set up the Surveyor's Pole of the Industry
CUI Guang-yao
..............page:34-35
Let Data Fusion Specialized and Thorough
CUI Guang-yao
..............page:40
Countdown Exhibit Look-ahead Development
BAI Jie
..............page:41
From Intelligent Network to Intelligent Service
cui guang yao
..............page:43
Dongmaling TM Identity Authentication Centre Comes out
cui guang yao
..............page:43
Railway Informatization Introduced "IT Automatic Management"
zhong tie xin xi gong cheng ji tuan
..............page:48-50
Analysis on Gaussion Channel Capacity of MTMRA System
YAN Chao
..............page:69-70,72
An improved Cholesky decomposition method based on DSP implement in joint Detection
YUAN Li-lin;LI Gui-yong;WANG Dan
..............page:71-72
A fast fixed-codebook search algorithm
ZHU Min;ZHU Xiao-kang
..............page:73-75
Security Analysis and Protection of Bluetooth Mobile Device
LU Xiang-mei;JIANG Jian-hong
..............page:76-78,81
Research of Security Embedded System Based on Trusted Platform Module
XIAO Xi;HUANG Hao;CHEN Lei
..............page:79-81
Defending of GoogleHacking Based on Engine Implementation and Search Skills
ZHOU Li-bing;LIU Jing-chao
..............page:82-83,86
A Design of Honeypot Based on Xen Virtual Machine
CHEN Ji-jun;ZHANG Xin-xin;HUANG Hao
..............page:84-86
From "Manslaughter Gate" to See Security's Safety
GUI Guang-yao
..............page:1
Industry Events
..............page:3-4
Directly Facing the Latest Threats of Network Security : Network Flushing
BAI Jie;LI Xue;HU Xiao-he
..............page:7-14
An EFI BIOS Self Security Enhancements Based Root of Trust
ZHOU Wei-dong;CHI Ya-ping;FANG Yong;WU Li-jun
..............page:87-88,91
Single sign-on for a whole organization with multiple application systems
LI Jun-yi;LIU Hui;TU Qiang
..............page:89-91
Research on a video encryption algorithm based on H.264
CAI Mian;WANG Ya-jun;CHANG Wei-hua;TANG Feng
..............page:92-94
Security Enhancement of EIGRP in Wireless Ad Hoc Circumstances
LIU Yang;TIAN Bo
..............page:95-97,100
Design of Blind Signature Scheme Based on Hyperelliptic Curve Cryptosystem
CHEN Yu-chun;ZHU Yan-qin
..............page:101-102,105
A novel Secure Communication of the Unified Chaos
LIU Yang;PENG Liang-yu
..............page:103-105
Analysis and standardization of intranet security technology
JinBo;ZhangBin;Wang Zhi-hai
..............page:109-110,114
Security Architecture for 10G Campus Network Based on Security Policy
GUO Hong-fang;HUANG Wei-qiang;ZHENG Kai
..............page:111-114
An Improved M-public-key cryptosystem Based on RS Codes
YAN Yu-ping;LIU Yu-jun
..............page:115-116
Secure File Filter System To Protect Data Leakage From Origin
LI Xiang-ming
..............page:117-119
Check Point Aims at New Market and New Direction
BAI Jie
..............page:42
ID-based Signature Scheme with Message Recovery
LEI Yong-jun;LIU Chun-gang;WANG Gang
..............page:120-121,124
IDS and IPS will coexist for a long time
YANG Yong-jun
..............page:122-124