Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2008 Issue 3
ISO18000-6C based Authentication Protocol for RFID Standards
LIU Zhi-fei;WANG Ling
..............page:82-83,86
An Anonymity-Revoking Fair Blind Proxy Signature Scheme
LIU Min;ZHOU Liang
..............page:84-86
Construction of LDPC Codes Based on Cyclic Shift Matrix
ZHU Chen-hao;SHI Hao-shan
..............page:78-81
Decision Tree based Detection of Botnet Flow
XIE Kaibin;CAI Wandong;CAI Junzhao
..............page:76-77,81
An Algorithm for Fragile Watermarking Based on HVS in DWT Domain
LIU Ya-feng;XIE Jin-ren
..............page:72-75
Design and Implementation of e-Document Protection System based on PDF
GAO Meng;FAN Lei;LI Jian-hua
..............page:69-71
Analysis on Methods for Document Protection in Computation Environment of Terminal
DING Li;YANG Lin;ZHANG Yong-Ding;GE Fang-Bin
..............page:66-68
Application Of PKI in Application Systems
YIN Xiao-Hui
..............page:64-65
Research on Encryption Algorithm based on Chaotic Maps
HUANG Fang-jun
..............page:62-63
Trust Evaluation based on Fuzzy Petri Net
LONG Yi-hong;PAN Dan;ZHANG Hai-song;TANG Zhi-hong
..............page:58-61
Extended STAT Based Network Security Monitoring
SONG Zhi-gang;CAI Jian-wei;QIU Wei-dong
..............page:55-57,61
Non-contact IC Card Disturbs Dyadic Bypass Attack and Protections
JIANG Ye;XUE Zhi;WANG Yi-jun
..............page:52-54
Research and Implementation of Obtaining Network Information Platform Based on PFADS
ZHAI Jian-hong;WANG Yan;LI Chao
..............page:49-51,54
A Novel Data Security Mechanism Suitable for Document Security
CAI Luo-cheng;HE Zhi;ZHONG Bo
..............page:46-48
Study on Soft Handover in WCDMA System
LUO Yan;SHI Hao-shan;LI Qiang
..............page:40-42,45
An Overview Of Equalization Algorithms For MIMO Communication Systems
YE Yuan-yuan;GE Li-jia
..............page:36-39
A Method for Digital Demodulation Based on SDR
MA Zi-ji;ZHEN Shan-xian;LIU Hong-li
..............page:34-35,39
rsa: xin xi an quan hu huan si wei ge ming
bai jie
..............page:28
guan zhu nin de " xin zang " an quan qi ye he xin xin xi zi chan fang hu
xi an jiao da jie pu gong si
..............page:26-27
wang shen shi xian shou ru li run shuang fan fan
cui guang yao
..............page:21-22
Research on Security Management of E-government
WANG Zheng;HE Kai-cheng;LI Jian-jun;HAN Wen-bao
..............page:15-18
wu xian wang an quan ji jiang mian lin 4g shi dai
hu xiao he
..............page:10-13
xi tong bu neng cheng shou zhi zhong
cui guang yao
..............page:1
zheng fu cai gou ying you xian cai gou ben guo chan pin
cai zheng bu wang
..............page:2
Industry Events
..............page:3-4