Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2008 Issue 10
Attack and Defenee of Trojan Horse for Dynamic Password System
WANG Hai-long;DAI Ying-xia
..............page:65-67
An Authorization System with The Support of Multiple Access Control Methods and Policy Inheritance
LONG Yi-hong;WU Shuo;Tang Zhi-hong;ZHANG Hai-song
..............page:68-70
Embedded Encrpytion Application of of Digital Television Signal
GAO Mei-zhen
..............page:63-64,67
ARP Security Analysis
QIAN Hua-feng
..............page:60-62
IMDCT Optimization Algorithm of MP3 Decoding
CHEN Jian-shou;CHEN Yong-en
..............page:57-59
Design on Special Topical Internet Information Gathering System
HE Li-yi;QIU Yong-gang
..............page:55-56,59
Echo Canceller Integrating Diverse Adaptive Filtering Algorithms
XIA Hong-Gen;SONG Yan;DAI Li-Rong
..............page:50-54
A Design and Implementation of Reliable Mobile Storage Media Management System
WANG Qing-feng;LIU Gong-shen
..............page:46-49
Research on Security Architecture of Procuratorial Information System
ZHONG Fu-xiong;DENG Ke;TIAN Yu;ZHAO Qing;WU Bin;CHENG Sun-jun
..............page:43-45
Huawei Products: Doing from Details
..............page:40-41
Industry Events
..............page:3-4
Social-Contact Website, Not Easy to Say "Love You"
BAI-lie
..............page:5-10
Charge-free Implies "Killing" the Manufacturer at home
HU Xiao-he
..............page:11-12
Rule by Machine, by Man or by law?
..............page:16-18
Be An Honest Man Do A Remarkable Job
HU Xiao-he
..............page:23-25
Analysis of WLAN Safety Standard and Technology
LI Jian
..............page:71-74
Analysis of Stack Overflows on Windows DNS Server
Tang Lei;Xue Zhi
..............page:75-76
Study on Electronic File Security Protection Model
CHEN Shang-yi
..............page:77-79
Application of FRA in the Long-distance Transmission System of CATV
JIANG zhi-li;GAO chang-liang;LI li
..............page:80-82
An Analysis of Linux/Slapper Worm
WANG Kang;ZHU Lei-ming;YANG Zhi-dan
..............page:83-86
Design of Controllable Data Processing Platform Based on MAC Policy
WANG Zheng;ZENG Guang;LI Jian-jun;HAN Wen-bao
..............page:87-89,93
Study on Communities Security Model based on Mobile Agent
ZHENG Guang-hai;QU Ying-wei
..............page:90-93
Intrusion Detection System Based on Multimedia Analysis
XI Yang;XIA Hong-shan
..............page:94-96
Technical Implementation of VPN Communications within the Campus
ZHOU Tong;SONG Hai-jun
..............page:97-99
Design and Implementation of Information Distributing Platform of Meteorological Warning
WANG Feng;SHI Xing-rong;ZHANG Ya;CHENG Xiao-quan;ZHENG Su-ming
..............page:100-101,104
Design and Implementation of Secure Password Generator
MA Gang-yong;QUAN Jian-xiao;HAN Wen-bao
..............page:102-104
Lattice Attack on a Public Key Cryptosystem
YU Zhi-qiang;LUO Shi-xin;XU Shu-min;YE Song
..............page:105-107
A Surefire Strategy for Network Security
LI Xue
..............page:31-32
Whatever Is UTM?
CHEN Sheng-quan
..............page:29
Everything Is Possible
MU Ying
..............page:1