Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2008 Issue 5
Analysis of Blind SQL Injection Techniques
WANG Li-li;PENG Yi-nan;WANG Yi-jun
..............page:71-73,76
Progress of Privacy Preserving Data Mining Research
REN Jing-han;ZHANG Bao-wen;CHEN Xiao-hua
..............page:77-79
Research on Reconfigurable FPGA based on Image Fusion
NIU Xin-wei;LI Hui-fang;ZHANG Chen;MA Jian-cang
..............page:67-68,70
Design and Implementation of Patch Distribution and Management System
GUO Hai-qiong;WU Shi-zhong
..............page:63-66
Authentication Analysis Of Features Based On Lip-reading Recognition
LV Pin-xuan;WANG Shi-lin;LI Sheng-hong
..............page:60-62
A Modified Multicast Key Management Scheme Based on LKH
ZHANG Kun;JINAG Xing-hao;YAO Yi-feng
..............page:57-59
A Role Based File Protection Model And Its Implementation
WEI Ke;FAN Lei;LI Jian-hua
..............page:53-56
Performance Analysis and Optimization of IPSec VPN
LUO Jin;ZHAO Xu;YANG Jie
..............page:50-52
The Setting Strategy of Multi-source Streaming Media Buffer Size Based on Grouping
SHI Hou-bing;ZHU Yi-an;WANG Yun-lan;Nian Fu-feng
..............page:48-49
Analysis of DoS Attack and Defense on Multicast in Wireless Ad Hoc Networks
YUE Ning;JIANG Xing-hao
..............page:80-82
Research on Elements of TrueFFS and Its Applications
ZHAO Xu;LUO Jin;WU Jie;YANG Jie;ZHU Xiao-lian
..............page:83-85
Discussion on Intranet Security Defence of Government Information Network System
HUANG Wei-min;TU Yi-bo;ZHANG Wei;XU Peng-feng
..............page:86-88
Security Management and SAC Reports on IBM Mainframe
XIA Qing-guo;SHEN Hai-song
..............page:89-91
Research about IHO S-63 Data Protection Scheme
ZHOU Jing;CHEN Gong-liang;GONG Jie-zhong
..............page:95-96
Improvements of a Trust Management Model
LI Chao;LI Xiao-yong;GUAN Hai-bing
..............page:97-98
fu wu qi qun zu fang hu jie jue fang an
zhang yong bin
..............page:42-43
fortinet zheng he qi ye qu dao zhan lue
cui guang yao
..............page:39
qi ye fang du cun zai an quan guan li wen ti
hu xiao he
..............page:34
qian tan xin xi an quan fa zhan dong xiang
nan xiang hao
..............page:28-29
zi ben de zao dong
cui guang yao
..............page:1
Industry Events
..............page:4-6
zhi wang guan lai , shang shan ruo shui
mu zuo
..............page:7-8
an quan qi ye shang shi , yin zuo zhi ke hu
hu xiao he
..............page:16-18
cong ying ji nian hui tou shi an quan huan jing yu ren wu
cui guang yao
..............page:19-20
Project of Patch management System for Hunan Police Fire Brigade
WANG Xiang-xin
..............page:99-101