Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2008 Issue 4
Design and Optimization of Generalized Chebyshev Filters and Research on Fast Tuning Technique
ZHAO Xiao-dong;WANG Gang
..............
page:71-74
Estimation of Scale Exponent of PPL Process Based on Wavelet Analysis
Lu Zheng-jun;DUAN Zhe-min;SHI Bing-bing
..............
page:75-76,79
Industry Events
..............
page:3-4
Analysis of Boolean Functions in AES S Box
CAI Hai;ZHOU Liang
..............
page:77-79
Security Model Design for Lustre Storage System
CHANG Xing-hua
..............
page:80-82
Distributed SOC Technology System based on Multi-Source Events Fusion
QI Jian-huai;ZHENG Wei-fan;WU Li-hua;SONG Jing
..............
page:67-70
Design of ADF IF Signal Processing Module Based on SDR
LI Yong;ZHU Zi-guang;LI Tao
..............
page:65-66,70
Analysis on Security Performance of Optical CDMA System
LI Yong-ping;YANG Zhi-cheng
..............
page:63-64
Design and Realization of Security Model Based On P2P Universal Computing Platform
ZHANG Xiu-feng;YE Jia-zi;ZHANG Xin-jia
..............
page:61-62
Authorization Management in Hierarchical and Cross Departments Collaboration E-Government Environment
WANG Xiang
..............
page:58-60
Root Certificate Updating Method Based on Certificate Attributes
ZHU Hui-fang;YANG Shu-tang;LU song-nian
..............
page:55-57
Steganalysis Based on Higher-order Statistics of YCbCr Panels for JPEG Images
LU Ya;CHEN Li-ya
..............
page:53-54,57
Feature Analysis of Information Security Investment for e-Government
ZHU Wei-wei
..............
page:50-52
cp secure zhong guo qu zhang men ren de shi chang jing
hu xiao he
..............
page:20-21
University Cultural Security In a Global Vision
XU Bin;PU Yao
..............
page:17-19
dao yuan suo yi ren zhong
cui guang yao
..............
page:1
xin chan bu jiang chu tai yi xi lie xin cuo shi jin yi bu zhi li la ji duan xin
..............
page:2
liang hui dai biao re yi xin xi an quan yu wang luo guan li
li xue
..............
page:5-8
shang shi ,ceo de xin jie dui zhong guo qi ye zuo zuo shang shi lu de fan si
hu xiao he
..............
page:9-10
wang luo wu jie kao wen shen fen an quan
bai jie
..............
page:11-13
sheng wu shi bie , ying mian er lai
xu ning
..............
page:14-16
wen juan diao cha
..............
page:84
Study and Analysis on TCP Traversal through NAT
MA Yi-tao;XUE Zhi;WANG Yi-jun
..............
page:47-49
A Network Security Analysis Method Based on Graph Theory
CUI Jian-qing;LU Song-nian;YANG Shu-tang
..............
page:44-46
Analysis on the Virus of Smartphone
DING Yu;SUN Jian
..............
page:42-43,46
Authentication Mechanism Based on IGMP in Local Area Network
GoNG Zan;JIANG Xing-hao;YAO Yi-feng
..............
page:39-41
A Survey on Trust Model of Peer-to-Peer Network
SUN Yu;GUAN Hai-bing
..............
page:37-38
Detection of Peer-to-Peer Botnets
DONG Kai-kun;LIU Yang;GUO Li;DONG Lan
..............
page:34-36
Study on MAC-based Fairness Evaluation Index for Resilient Packet Rings
HUANG Shi-guang;CHENG Fang;ZHANG Zhi-zhong
..............
page:31-33
jumpsec zhi neng hua vpn xi tong
..............
page:30
lian suo xing ji gou ru he bao zheng xin xi an quan chuan shu lian xiang wang yu utm lian suo qi ye jie jue fang an
..............
page:29
wei shi tong dian zi zheng wu wai wang xin xi an quan bao zhang ti xi she ji fang an
wu hong zhong
..............
page:28
wei fu wu ao yun zuo zhun bei , ning bo bei fa yi chinasec gou zhu nei wang an quan bao lei
..............
page:27
jin shan bai du lian meng shi shui mian fei sha du
shi li
..............
page:26
ibm zhu li qi ye shi xian " san hua "
bai jie
..............
page:25
cloudmark qiang hua zhong guo shi chang ce lue
cui guang yao
..............
page:24
an quan shi chang ying lai bao fa qi qi ming xing chen da zao xin xi an quan di yi pin pai
..............
page:22-23