Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2008 Issue 9
User Certificate Management System based on Open SSL
CHENG Xu-bin;BI Hong-jun
..............page:72-73
A Security Application Solution Based On Cryptoki API
YAN Shan;BI Hong-jun
..............page:74-76
Research on Area for Security Protection of Procuratorial Information System
ZHANG Ting-yu;ZHONG Fu-xiong;DENG Ke;WANG Shuo;SHAN Zhi-gang;JIA Mao-lin
..............page:77-78,80
Study on Electronic File Security Protection Model
CHEN Shang-yi
..............page:79-80
Application and Research Of Digital Chinese Traditional Dance Information
FENG Wei;DUAN Zhe-min;WANG Shu-min;SHAo Shu-yuan
..............page:81-83
Modeling 0n Security Alarm System Based on CIM
SUN Ling;WANG Yi-Jun;XUE Zhi
..............page:84-86
Network Attack/Defense and Game Theory
DING Xiao-feng;XUE Zhi
..............page:87-89
Up-to-date Difficulties and Countermeasures for Secrets In Scientific Research Institution
LI Hong-min;LIU Hong-qiang;CHENG Zhi;LU Min;LING Rong-hui
..............page:69-71
Security Control of GPS Vehicle Monitoring System
ZHANG Zhao-yu;ZHANG Xiu-feng
..............page:66-68
Research on UTM Technology
LIANG Ming-jun
..............page:64-65,68
Management of Mobile Mass Storage Devices in Secret-keeping Work
YANG Yong-hui;FAN Jin-sheng;HAO Zhe
..............page:61-63
The Study of Secure Localization in Wireless Sensor Networks
YANG Yue;WANG Fu-bao;DUAN Wei-jun
..............page:56-60
Discussion on Mechanisms of Digital Signature and Crypto Key Exchange
GUAN Zhi;NAN Xiang-hao
..............page:46-47
Introduction on China-made Secure Database Product Gbase 8s
tian jin nan da tong yong gong si chuang xin zhong xin
..............page:44-45
List of Credentials-Acquired Organizations for Qualifications and Endowments of Infosec Service
zhong guo xin xi an quan ren zheng zhong xin
..............page:43
Jump's High-capability UTM System
jiao da jie pu
..............page:41-42
Application of NORCO P4 High-end Products in CRM Centre System
hua bei gong kong
..............page:39-40
Success End of Security Chip for Terminal Equipment
CUI Guang-yao
..............page:36-37
Development Trend for UTM
Jens Andreasssen
..............page:35
Observing Information Security from Olympic Games
CUI Guang-yao
..............page:1
Industry Events
..............page:3-4
How Far From"Secure Operation and Maintenance"?
BAI Jie
..............page:14-17
Erecting A Secure Thoroughfare for Mobile Information
MU Ying;JIANG Ying
..............page:18-20
Pioneering Work Changing Destiny
CUI Guang-yao
..............page:21-22
How to Realize"Safety of Network Soul"
HU Xiao-he
..............page:27-28
Antvirus Hardware Gateway Driving Viruses out of"Gate"
CUI Guang-yao
..............page:33
Chaotic FH Sequences based on Baker Map
ZHANG Ying;LI Dong-xian;WANG Bin
..............page:96-98,103
Research on Security of E-Government Network System
WANG Liang;LU Yu;LI Zhi-peng
..............page:99-103
Security Assurance Operation Framework based on E-Government
ZOU Mao-yang
..............page:104-105
zheng gao qi shi
..............page:105