Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2008 Issue 1
Feed Injection and Defenses in Web2.0
PENG Yi-nan;WANG Yi-jun
..............
page:77-79
Research on Development and Countermeasures of Virus in Smart Phone
LV Hai-jun;CHEN Qian-bin;WU Xiao-Ping
..............
page:80-82
A Cluster-based Secure Routing Protocol in Wireless Sensor Networks
WANG Yue-jiao;WU Yue
..............
page:83-85
A Non-repudiation Exchange Protocol Based on Semi-trusted Center
YANG Yu-qi;PAN Rui-jie;GAO Xiao-Guang
..............
page:86-88
Sta Trust: To Be Quality-and-Brand "Hospital" of Information Security
HU Xiao-he
..............
page:27-28
An Indicator System of Information Assurance for Aeronautical Information System
WANG Jian;PENG Yue;WU Zhi-jun
..............
page:24-26
Research on the Information Security Curriculum for Management Science Major
WANG Ying
..............
page:22-23,26
A Sustained Development of 2007 IDS Market, An Enhanced Centralization of Quality and Brand
bei jing qi ming xing chen ji shu you xian gong si
..............
page:21
Infosec Shoulders Heavy Responsibilities for Independence-Brand Cars
HU Xiao-he
..............
page:19-20
Taste Ten Years' Flavor, Be in Lead of Security
BAI Jie
..............
page:16-18
Front and Back Markets for Information Security
CUI Guang-yao
..............
page:1
Take Focal Work as Lead, Comprehensively Promote Construction of Infosec Assurance
CUI Guang-yao
..............
page:2-4
Industry Events
..............
page:5-8
Overview on 2007 Focal Events of Information Security
LI Xue
..............
page:11-15
A Unix Security Auditing System Based on Dynamic Tracing
XUE Zhi-ping;XUE Zhi;WANG Yi-jun
..............
page:74-76
Research on Gigabit VPN Technology
WANG Liang
..............
page:71-73
Storage Security of Files & Data
JI Yao;LIU Hai-tao
..............
page:68-70
Research on Hardware Acceleration for Security Gateway Content Filter
HAN Hong-zhe;BI Xue-yao
..............
page:65-67
An Anonymity-revoking Electronic Impeaching System Based on Group Signature
ZHUANG Jin-xian;QIU Wei-dong
..............
page:62-64
Based on Risk Assessment, Classifying to Build the Information and Technology Assurance System
BI Lian-cheng;SUN Tian
..............
page:59-61
Digital Image Watermarking Techniques for Printing Image Copyright Protection
HE Lan;KONG Xiang-wei;YOU Xin-gang
..............
page:55-58,61
Research on of Simulation Doppler Frequency-Shift in Satellite Signal Simulator
LIU Jie;LIAN Bao-Wang;LI Zhi-Jun
..............
page:52-54
Cognitive Radio and Detecting Primary Users
LIU Yu-tao;TAN Xue-zhi
..............
page:49-51
Design and Realization of Manager and Schedule Method for Broadcast System with P2P
KANG Fang;YANG Zhi-yi;WANG Dao-bin
..............
page:46-48
Research on Physical Layer Technique Of UAV Adhoc Network
HUANG Zhi-qing
..............
page:44-45,48
1553B Networking Research
JIANG Qi;CHEN Shao-wei;WANG Qiu-jun
..............
page:41-43
Research on Trace Route Algorithm for P2P Streaming Peer Distribution
LIAO Meng-ze;YANG Yu-hang
..............
page:39-40,43
WatchGuard Firebox Series Products——Attending to Each and Every Aspect of A Matter
..............
page:38
Security, Assurance of the Speed!
..............
page:37
Security Defence and Remote Access Reaching the Goal in a Single Bound
..............
page:36
"Chinaguard" Column——Chinaguard SSL VPN Providing Mobile Official Business with Security Solution
LUO Hui
..............
page:34-35
WAN Security Construction for Tianjin Tobacco Industry
CUI Guang-yao
..............
page:33
Jabil Circuit and You Jointly Constructing Harmonic Secure Network
DIN Chang-fu
..............
page:31-32
SafeNet Expanding Its Input in China
cui guang-yao; cui guang yao
..............
page:30
Readjustment and Conformability Entering New Realm
..............
page:29-30