Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2008 Issue 4
Estimation of Scale Exponent of PPL Process Based on Wavelet Analysis
Lu Zheng-jun;DUAN Zhe-min;SHI Bing-bing
..............page:75-76,79
Industry Events
..............page:3-4
Analysis of Boolean Functions in AES S Box
CAI Hai;ZHOU Liang
..............page:77-79
Security Model Design for Lustre Storage System
CHANG Xing-hua
..............page:80-82
Distributed SOC Technology System based on Multi-Source Events Fusion
QI Jian-huai;ZHENG Wei-fan;WU Li-hua;SONG Jing
..............page:67-70
Design of ADF IF Signal Processing Module Based on SDR
LI Yong;ZHU Zi-guang;LI Tao
..............page:65-66,70
Analysis on Security Performance of Optical CDMA System
LI Yong-ping;YANG Zhi-cheng
..............page:63-64
Design and Realization of Security Model Based On P2P Universal Computing Platform
ZHANG Xiu-feng;YE Jia-zi;ZHANG Xin-jia
..............page:61-62
Root Certificate Updating Method Based on Certificate Attributes
ZHU Hui-fang;YANG Shu-tang;LU song-nian
..............page:55-57
cp secure zhong guo qu zhang men ren de shi chang jing
hu xiao he
..............page:20-21
University Cultural Security In a Global Vision
XU Bin;PU Yao
..............page:17-19
dao yuan suo yi ren zhong
cui guang yao
..............page:1
wang luo wu jie kao wen shen fen an quan
bai jie
..............page:11-13
sheng wu shi bie , ying mian er lai
xu ning
..............page:14-16
wen juan diao cha
..............page:84
Study and Analysis on TCP Traversal through NAT
MA Yi-tao;XUE Zhi;WANG Yi-jun
..............page:47-49
A Network Security Analysis Method Based on Graph Theory
CUI Jian-qing;LU Song-nian;YANG Shu-tang
..............page:44-46
Analysis on the Virus of Smartphone
DING Yu;SUN Jian
..............page:42-43,46
Authentication Mechanism Based on IGMP in Local Area Network
GoNG Zan;JIANG Xing-hao;YAO Yi-feng
..............page:39-41
A Survey on Trust Model of Peer-to-Peer Network
SUN Yu;GUAN Hai-bing
..............page:37-38
Detection of Peer-to-Peer Botnets
DONG Kai-kun;LIU Yang;GUO Li;DONG Lan
..............page:34-36
Study on MAC-based Fairness Evaluation Index for Resilient Packet Rings
HUANG Shi-guang;CHENG Fang;ZHANG Zhi-zhong
..............page:31-33
jumpsec zhi neng hua vpn xi tong
..............page:30
ibm zhu li qi ye shi xian " san hua "
bai jie
..............page:25
cloudmark qiang hua zhong guo shi chang ce lue
cui guang yao
..............page:24