Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2008 Issue 3
ISO18000-6C based Authentication Protocol for RFID Standards
LIU Zhi-fei;WANG Ling
..............
page:82-83,86
An Anonymity-Revoking Fair Blind Proxy Signature Scheme
LIU Min;ZHOU Liang
..............
page:84-86
The discussion of information security problems and corresponding countermeasures
QI Jian-huai;XU Guo-qian
..............
page:87-90
Construction of LDPC Codes Based on Cyclic Shift Matrix
ZHU Chen-hao;SHI Hao-shan
..............
page:78-81
Decision Tree based Detection of Botnet Flow
XIE Kaibin;CAI Wandong;CAI Junzhao
..............
page:76-77,81
An Algorithm for Fragile Watermarking Based on HVS in DWT Domain
LIU Ya-feng;XIE Jin-ren
..............
page:72-75
Design and Implementation of e-Document Protection System based on PDF
GAO Meng;FAN Lei;LI Jian-hua
..............
page:69-71
Analysis on Methods for Document Protection in Computation Environment of Terminal
DING Li;YANG Lin;ZHANG Yong-Ding;GE Fang-Bin
..............
page:66-68
Application Of PKI in Application Systems
YIN Xiao-Hui
..............
page:64-65
Research on Encryption Algorithm based on Chaotic Maps
HUANG Fang-jun
..............
page:62-63
Trust Evaluation based on Fuzzy Petri Net
LONG Yi-hong;PAN Dan;ZHANG Hai-song;TANG Zhi-hong
..............
page:58-61
Extended STAT Based Network Security Monitoring
SONG Zhi-gang;CAI Jian-wei;QIU Wei-dong
..............
page:55-57,61
Non-contact IC Card Disturbs Dyadic Bypass Attack and Protections
JIANG Ye;XUE Zhi;WANG Yi-jun
..............
page:52-54
Research and Implementation of Obtaining Network Information Platform Based on PFADS
ZHAI Jian-hong;WANG Yan;LI Chao
..............
page:49-51,54
A Novel Data Security Mechanism Suitable for Document Security
CAI Luo-cheng;HE Zhi;ZHONG Bo
..............
page:46-48
Evaluating Method for Reliability of Probabilistic Network
WU Hai-bo
..............
page:43-45
Study on Soft Handover in WCDMA System
LUO Yan;SHI Hao-shan;LI Qiang
..............
page:40-42,45
An Overview Of Equalization Algorithms For MIMO Communication Systems
YE Yuan-yuan;GE Li-jia
..............
page:36-39
A Method for Digital Demodulation Based on SDR
MA Zi-ji;ZHEN Shan-xian;LIU Hong-li
..............
page:34-35,39
Channel Estimation Algorithm Based on FFT with Multiple Pilot Patterns in OFDM System
LI Yong;LI Que
..............
page:30-33
qi ming xing chen zhu zhong qing gang tie bao an quan
..............
page:29
rsa: xin xi an quan hu huan si wei ge ming
bai jie
..............
page:28
guan zhu nin de " xin zang " an quan qi ye he xin xin xi zi chan fang hu
xi an jiao da jie pu gong si
..............
page:26-27
shu ju diu shi : qi ye mian lin de zui da xin xi an quan tiao zhan
li xue
..............
page:24-25
jin shan fa bu 2007 nian du an quan bao gao :" gong ye hua " ru qin fang shi la dong bing du jing ji
li xiao guang
..............
page:23
wang shen shi xian shou ru li run shuang fan fan
cui guang yao
..............
page:21-22
guo mai ke ji , shi zuo " quan mian " nei wang an quan xian xing zhe
bai jie
..............
page:19-20
Research on Security Management of E-government
WANG Zheng;HE Kai-cheng;LI Jian-jun;HAN Wen-bao
..............
page:15-18
hua wei shou gou shou cuo chu dong guo jia an quan yi shi
bai jie
..............
page:14
wu xian wang an quan ji jiang mian lin 4g shi dai
hu xiao he
..............
page:10-13
feng ling zhi jian , ze ren suo xi bu fen lao zhuan jia men man tan xin xi an quan wen ti
cui guang yao ; li xue
..............
page:7-9
xi tong bu neng cheng shou zhi zhong
cui guang yao
..............
page:1
zheng fu cai gou ying you xian cai gou ben guo chan pin
cai zheng bu wang
..............
page:2
Industry Events
..............
page:3-4