Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2008 Issue 5
Analysis of Blind SQL Injection Techniques
WANG Li-li;PENG Yi-nan;WANG Yi-jun
..............
page:71-73,76
A Dynamic Identity Authentication Technology with Anti-fraud and Challenge Response Time Authentication
YAO Zhong-kai
..............
page:74-76
Progress of Privacy Preserving Data Mining Research
REN Jing-han;ZHANG Bao-wen;CHEN Xiao-hua
..............
page:77-79
Research on Analysis Techniques of Network Security Vulnerability
ZHU Si-feng
..............
page:69-70
Research on Reconfigurable FPGA based on Image Fusion
NIU Xin-wei;LI Hui-fang;ZHANG Chen;MA Jian-cang
..............
page:67-68,70
Design and Implementation of Patch Distribution and Management System
GUO Hai-qiong;WU Shi-zhong
..............
page:63-66
Authentication Analysis Of Features Based On Lip-reading Recognition
LV Pin-xuan;WANG Shi-lin;LI Sheng-hong
..............
page:60-62
A Modified Multicast Key Management Scheme Based on LKH
ZHANG Kun;JINAG Xing-hao;YAO Yi-feng
..............
page:57-59
A Role Based File Protection Model And Its Implementation
WEI Ke;FAN Lei;LI Jian-hua
..............
page:53-56
Performance Analysis and Optimization of IPSec VPN
LUO Jin;ZHAO Xu;YANG Jie
..............
page:50-52
The Setting Strategy of Multi-source Streaming Media Buffer Size Based on Grouping
SHI Hou-bing;ZHU Yi-an;WANG Yun-lan;Nian Fu-feng
..............
page:48-49
The Implementation of Miscall Notice Service Based on Probe Technology
LIU Yong;WU Tong
..............
page:45-47
Analysis of DoS Attack and Defense on Multicast in Wireless Ad Hoc Networks
YUE Ning;JIANG Xing-hao
..............
page:80-82
Research on Elements of TrueFFS and Its Applications
ZHAO Xu;LUO Jin;WU Jie;YANG Jie;ZHU Xiao-lian
..............
page:83-85
Discussion on Intranet Security Defence of Government Information Network System
HUANG Wei-min;TU Yi-bo;ZHANG Wei;XU Peng-feng
..............
page:86-88
Security Management and SAC Reports on IBM Mainframe
XIA Qing-guo;SHEN Hai-song
..............
page:89-91
Quantum Circuit Implementation for SubByutes Transformation in AES Algorithm
LIU Yao;ZHU Fu-chen
..............
page:92-94
Research about IHO S-63 Data Protection Scheme
ZHOU Jing;CHEN Gong-liang;GONG Jie-zhong
..............
page:95-96
Improvements of a Trust Management Model
LI Chao;LI Xiao-yong;GUAN Hai-bing
..............
page:97-98
lian xiang wang yu yi chang liu liang guan li xi tong zai zheng fu xin xi zhong xin de ying yong
..............
page:44
fu wu qi qun zu fang hu jie jue fang an
zhang yong bin
..............
page:42-43
nei rong an quan yu wang luo an quan de wan mei jie he zhong hua wei shi xin yi dai an quan wang guan
luo bai sheng ; luo jun
..............
page:40-41
fortinet zheng he qi ye qu dao zhan lue
cui guang yao
..............
page:39
kai chuang nei wang an quan zhu dong fang yu de xin shi dai
bai jie
..............
page:38
wei liao teng fei de an quan unisys jiao tong ji yun shu jie jue fang an da hui
bai jie
..............
page:37
bi mian " shu ju men " shi jian yi zai shang yan xin xing an fang ruan jian zhu bai wan qi ye yan ba nei bu shu ju
hang zhou heng xing luo ke ke ji you xian gong si
..............
page:35-36
qi ye fang du cun zai an quan guan li wen ti
hu xiao he
..............
page:34
lian xiang wang yu cong " jia fa " dao " cheng fa " lian xiang wang yu lan hai zhan lue zou xiang zong shen
cui guang yao
..............
page:32-33
The Problems in China's Information Security Management Research and Some Correlative Thoughts
Xu Dong-hua
..............
page:30-31
qian tan xin xi an quan fa zhan dong xiang
nan xiang hao
..............
page:28-29
zi ben de zao dong
cui guang yao
..............
page:1
gong ye he xin xi hua bu dang zu fu shu ji fu bu chang zuo guo hua qiang diao : qiang hua wu xian dian jian ce gong zuo bao zhang ao yun hui he guo jia xin xi an quan
..............
page:2
tong xin ye duo guan qi xia zhi li la ji duan xin
..............
page:3
Industry Events
..............
page:4-6
zhi wang guan lai , shang shan ruo shui
mu zuo
..............
page:7-8
pin wen hua zhi wei wu cheng gong zhi dao xin xi an quan qi ye wen hua mian mian guan
li xue ; bai jie ; hu xiao he
..............
page:9-15
an quan qi ye shang shi , yin zuo zhi ke hu
hu xiao he
..............
page:16-18
cong ying ji nian hui tou shi an quan huan jing yu ren wu
cui guang yao
..............
page:19-20
an quan , bao zhang jiao yu xing ye xin xi hua cheng chang
bai jie
..............
page:21-23
xian shen shuo fa : jin fang dai you " tong xue huo hao you zhao pian " de e yi you jian
hu xiao he
..............
page:24-25
shou ji guang gao yi jing cheng wei la ji xin xi xin zhan chang
bai jie
..............
page:26-27
Project of Patch management System for Hunan Police Fire Brigade
WANG Xiang-xin
..............
page:99-101