Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2008 Issue 6
Anonymous-oriented Monitoring of Data Packet Capture Technology
ZHAO Wei;CAI Wana-long;ZHAO Yu
..............page:70-72
A Design of PMI System Adaptable To Huge Distributed Application
ZHOU Li-bing;ZHOU Xue-guang;GUO Fu-liang
..............page:73-74,77
WiMAX Security Mechanism Analysis and Research
HU Tao;XUE Zhi;LI Jian-hua
..............page:75-77
Discussion on Hierarchical Security for Classified Information System
LI Yuan-feng;CAI Ya-liang
..............page:78-79,82
A Survey on Digital Fingerprinting Coding
ZHANG Wei-ke;YOU Xin-gang;KONG Xiang-wei
..............page:80-82
Study on Virtual Honeynet with Xen Hardware Virtual Machine
HE Qing;WANG Yi-jun;XUE Zhi
..............page:83-85,88
Identity Based Encryption Technology
ZHANG Qing-sheng;CHEN Deng-feng;DING Yao;WANG Lei
..............page:86-88
Principle and Attack Method of Kernel Overflow under Win32 Enviroment
XU Hao;WANG Yi-jun;XUE Zhi
..............page:89-91
Pure Software Encryption Method for Web Application System
LI Xue-jian
..............page:92-93
The Research of Facial Animation based on Direct3D
ZHANG Li;FAN Yang-yu;ZHANG Sheng-chao
..............page:67-69
Digital Signature Algorithms and Their Comparisons
WANG Chuan;SUN Bin
..............page:64-66
On Elliptic Curve Primality Proving
ZHANG Li-jun
..............page:59-63,66
Quantum Circuit Implementation of AES Algorithm
LIU Yao;ZHU Fu-chen
..............page:56-58
qiang xian jiu zai , bing ji ru huo
di guang yao
..............page:1
guo wai an quan qi ye xun bao zhong guo
bai jie
..............page:7-13
qi ming xing chen ips tu po web fang yu jiang ju
di guang yao
..............page:33
wen dang jia mi lei chan pin de xuan ze
hang zhou heng xing luo ke
..............page:37-38
Preliminary Study on Network Security
PENG Fei
..............page:94-97,101
A Management Framework Based on Mobile Agent for Wireless Sensor Network
WANG Yan-ming;ZHU Yi-an;GONG Bin
..............page:98-101
A New Information Security System Model
TANG Hong-yu;CUI Dong-hua
..............page:102-105
Network Anomaly Detection based Fine Traffic Analysis
ZENG Xi;DU Jiang;HE Li-lan
..............page:106-108
Overview on U-virus Prevention
ZHANG Qi;ZHANG Feng;MA Yan-gang
..............page:109-111
An Improved Secure Routing Protocol For Ad hoc Network
CAO Liang;JIANG Xing-hao
..............page:112-114,118
Study on the Symbol Synchronization for OFDM Systems
CUI Xin-rui;ZHANG Jie;YU Hong-mei
..............page:53-55
A Model for Analyzing Anonymous Communication Relations By Data Mining
CHEN Wen-hua;CAI Wan-dong;ZHAO Yu
..............page:51-52,55
Adaptive Echo Cancellation based on Blind Signal Separation
MA Ting;LI Hong;MA Jian-cang;YU Wen-xiang
..............page:47-50
jie pu dian li shang wang ren zheng jie jue fang an
zhang yong ; zhang xiao yang
..............page:45-46
shu ju jiao huan wang ji shu
di sheng jun
..............page:41-44
h3c fa bu quan xin utm chan pin
li xue
..............page:40-41
Block-wise Contourlet Transform-based Blind Image Separation Algorithm
PENG Wei-wei;JIANG Xing-hao
..............page:119-122
A Rerouting Anonymous Communication System Based on Serial Agents
WANG Yang-yan;CAI Wan-dong
..............page:123-125
jian xun
..............page:6