Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2008 Issue 10
Attack and Defenee of Trojan Horse for Dynamic Password System
WANG Hai-long;DAI Ying-xia
..............
page:65-67
An Authorization System with The Support of Multiple Access Control Methods and Policy Inheritance
LONG Yi-hong;WU Shuo;Tang Zhi-hong;ZHANG Hai-song
..............
page:68-70
Embedded Encrpytion Application of of Digital Television Signal
GAO Mei-zhen
..............
page:63-64,67
ARP Security Analysis
QIAN Hua-feng
..............
page:60-62
IMDCT Optimization Algorithm of MP3 Decoding
CHEN Jian-shou;CHEN Yong-en
..............
page:57-59
Design on Special Topical Internet Information Gathering System
HE Li-yi;QIU Yong-gang
..............
page:55-56,59
Echo Canceller Integrating Diverse Adaptive Filtering Algorithms
XIA Hong-Gen;SONG Yan;DAI Li-Rong
..............
page:50-54
A Design and Implementation of Reliable Mobile Storage Media Management System
WANG Qing-feng;LIU Gong-shen
..............
page:46-49
Research on Security Architecture of Procuratorial Information System
ZHONG Fu-xiong;DENG Ke;TIAN Yu;ZHAO Qing;WU Bin;CHENG Sun-jun
..............
page:43-45
First XTM Network Security Device Comes out
..............
page:42
Check Point Puts Out Completely New Solution VPN-I VE
..............
page:42
Huawei Products: Doing from Details
..............
page:40-41
Publication by China certification Centre for Information Security
..............
page:39
Brief Description and Industry Application of JUMP's Authenticating and Charging System
CHEN Hong-wei
..............
page:37-38
Industry Events
..............
page:3-4
Social-Contact Website, Not Easy to Say "Love You"
BAI-lie
..............
page:5-10
Charge-free Implies "Killing" the Manufacturer at home
HU Xiao-he
..............
page:11-12
Web3.0 Will Lead the New Time of Network Life
..............
page:13-15
Rule by Machine, by Man or by law?
..............
page:16-18
Consider the Importance of Information Security from by Communication Assurance for Olympic Games
..............
page:19
Multi-core's Domination Would Be Ultimately Changed into A United Domain
..............
page:20-22
Be An Honest Man Do A Remarkable Job
HU Xiao-he
..............
page:23-25
In-depth Application vs Data Security Innovation
LI Xue
..............
page:26
Analysis of WLAN Safety Standard and Technology
LI Jian
..............
page:71-74
Analysis of Stack Overflows on Windows DNS Server
Tang Lei;Xue Zhi
..............
page:75-76
Study on Electronic File Security Protection Model
CHEN Shang-yi
..............
page:77-79
Application of FRA in the Long-distance Transmission System of CATV
JIANG zhi-li;GAO chang-liang;LI li
..............
page:80-82
An Analysis of Linux/Slapper Worm
WANG Kang;ZHU Lei-ming;YANG Zhi-dan
..............
page:83-86
Design of Controllable Data Processing Platform Based on MAC Policy
WANG Zheng;ZENG Guang;LI Jian-jun;HAN Wen-bao
..............
page:87-89,93
Study on Communities Security Model based on Mobile Agent
ZHENG Guang-hai;QU Ying-wei
..............
page:90-93
Intrusion Detection System Based on Multimedia Analysis
XI Yang;XIA Hong-shan
..............
page:94-96
Technical Implementation of VPN Communications within the Campus
ZHOU Tong;SONG Hai-jun
..............
page:97-99
Design and Implementation of Information Distributing Platform of Meteorological Warning
WANG Feng;SHI Xing-rong;ZHANG Ya;CHENG Xiao-quan;ZHENG Su-ming
..............
page:100-101,104
Design and Implementation of Secure Password Generator
MA Gang-yong;QUAN Jian-xiao;HAN Wen-bao
..............
page:102-104
Lattice Attack on a Public Key Cryptosystem
YU Zhi-qiang;LUO Shi-xin;XU Shu-min;YE Song
..............
page:105-107
How to Ensure the Security of Hospital Intranet
..............
page:36
Chinasec's Experts: On Difficult Points for Hierachical Protection of Confidential Information System
WANG Zhi-hai
..............
page:35
Analysis on Some Typical Deployment Scenarios of SSL VPN
LUO Jun
..............
page:33-34
A Surefire Strategy for Network Security
LI Xue
..............
page:31-32
Cryption Technology- Essential Weapon for Checking the Hurricane of Data Leakage
LI Xue
..............
page:30-31
IBM Opening up 5 Enterprise-oriented Core Areas of Web 2.0
..............
page:27
Safe Net DRM Helping CCTV Network in Relaying Olympic Games Video
..............
page:28
Whatever Is UTM?
CHEN Sheng-quan
..............
page:29
Everything Is Possible
MU Ying
..............
page:1
A Circular on the Phased Work Situation for Specific Harness of Spare Message and A Notice on Requirements for Next-phase Work
..............
page:2