Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2008 Issue 8
Security Threat In Signaling System No.7 and Its Defense
tang lin ; wei gang
..............page:109-111,115
An E-Cash Scheme based on Bilinear Pairings and Partially Blind Signature
meng chun zuo ; yin xin chun ; song chun lai
..............page:136-137,140
Analysis and Using of Buffer OverFlow on Linux System
luo hong yan ; xue zhi
..............page:133-135
Research on Trusted and Safety-Controllable Embedded Computer
zuo zhong fang
..............page:70-71
Implementation of VOIP Technology Based on Softswitch System
ni yun xia ; hua zhu ping
..............page:55-56,60
Multiple Access Analysis in Onboard Processing of WGS
tang ; guo qing
..............page:146-149
Thought on Software Copyright Protection According to Law
wang zhen yan ; song shu cai ; zhao jian guang
..............page:26-28
Influences of Web Robot on Network Security and Solutions
liang xue song
..............page:94-96
Design of Access and Authentication System in IPv6
suo yong yong ; huang yue jiang
..............page:79-82
Risk Evaluating of Information System
zuo hong
..............page:155-157
CPK Cryptosystem Standard
..............page:21-22
Probing into Application of P2P Technology in IPTV
liu wei
..............page:61-63
Implementation and Modification Multimedia Communication based on RPM
zhang jian ; li chong gui
..............page:64-66,69
Generation and Application of Improved Attack Tree
cui bo yi
..............page:67-69
Key Management in End to End Encryption of TETRA System
luo guan zhou ; ge chun yu ; wu
..............page:97-98,101
Gintel Applies Virtualized System
..............page:41
Industry Events
..............page:3-4
CFAR Intrusion Detection Method Based on Network Flow Prediction Model
hu bi feng ; wei hong jun
..............page:112-115
Research of Security Architecture in Information Grid
zhou zuo ; zhou an min
..............page:83-88
Secondary Safety Protection Solution for Electric Power Industry
zhang xiao yang ; fang lei
..............page:42-43
A Unified Communication Security Solution
yu qin yong
..............page:72-75
The Research and Implementation on Formal Analysis of security protocols
xu meng zuo ; xiao cong ; li bin ; du biao
..............page:76-78
Research on Ajax and Message Publishing Approving Mechanism
yu qun ying
..............page:150-151
Optimized Research and Application of the EDF Algorithm in INS/GNSS System
zhou bao ; yan jun ; sun feng juan
..............page:138-140
Joint Source and Channel Matching Technique and Its Application
wang gang ; dong yu liang ; yang wen chao
..............page:52-54
The Improvement of Bluetooth Encryption Algorithm and Implementation on FPGA
tan yong liang ; yu hai xun ; wang liang
..............page:122-123,126
Information Security Management in Institutes
wang yue
..............page:124-126
Design and Analysis of Integrated Security Management System for Intranet of Public Security Bureau
wang wei biao ; huang wei min ; tu yi bo ; xu peng feng ; zhang wei
..............page:105-108
Research on Web Security Communication Model based on SOA
pei hua ; qing zuo
..............page:116-118
Analysis of Elliptic Curve Encryption Schemes
chen hong quan
..............page:141-142,145
Explotation of Honeypot Technology
wang chuan lin ; shang an ning
..............page:119-121
zheng gao qi shi
..............page:157