Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2008 Issue 9
User Certificate Management System based on Open SSL
CHENG Xu-bin;BI Hong-jun
..............
page:72-73
A Security Application Solution Based On Cryptoki API
YAN Shan;BI Hong-jun
..............
page:74-76
Research on Area for Security Protection of Procuratorial Information System
ZHANG Ting-yu;ZHONG Fu-xiong;DENG Ke;WANG Shuo;SHAN Zhi-gang;JIA Mao-lin
..............
page:77-78,80
Study on Electronic File Security Protection Model
CHEN Shang-yi
..............
page:79-80
Application and Research Of Digital Chinese Traditional Dance Information
FENG Wei;DUAN Zhe-min;WANG Shu-min;SHAo Shu-yuan
..............
page:81-83
Modeling 0n Security Alarm System Based on CIM
SUN Ling;WANG Yi-Jun;XUE Zhi
..............
page:84-86
Network Attack/Defense and Game Theory
DING Xiao-feng;XUE Zhi
..............
page:87-89
Necessity and Countermeasure Research of the Information Security Protection in Daily Life
XIANG Yi-bin
..............
page:90-92
Up-to-date Difficulties and Countermeasures for Secrets In Scientific Research Institution
LI Hong-min;LIU Hong-qiang;CHENG Zhi;LU Min;LING Rong-hui
..............
page:69-71
Security Control of GPS Vehicle Monitoring System
ZHANG Zhao-yu;ZHANG Xiu-feng
..............
page:66-68
Research on UTM Technology
LIANG Ming-jun
..............
page:64-65,68
Management of Mobile Mass Storage Devices in Secret-keeping Work
YANG Yong-hui;FAN Jin-sheng;HAO Zhe
..............
page:61-63
The Study of Secure Localization in Wireless Sensor Networks
YANG Yue;WANG Fu-bao;DUAN Wei-jun
..............
page:56-60
Handle Design of Embedded GUI-based Smartphone Platformscreen Consecutive POints Click
LIU Zhou-zhou
..............
page:54-55,60
Step 0ut from Misundcrstanding Realm of Security Isolation and Information Exchange Products
LI Ying;WU Xiang-yan
..............
page:52-53
Construction of Network Security Application System for Procuratorial organ
QI Yu
..............
page:48-51
Discussion on Mechanisms of Digital Signature and Crypto Key Exchange
GUAN Zhi;NAN Xiang-hao
..............
page:46-47
Introduction on China-made Secure Database Product Gbase 8s
tian jin nan da tong yong gong si chuang xin zhong xin
..............
page:44-45
List of Credentials-Acquired Organizations for Qualifications and Endowments of Infosec Service
zhong guo xin xi an quan ren zheng zhong xin
..............
page:43
Jump's High-capability UTM System
jiao da jie pu
..............
page:41-42
Application of NORCO P4 High-end Products in CRM Centre System
hua bei gong kong
..............
page:39-40
Intrusion Defence System by Leadsec Escorting Internal and External Network Security of Stock Market
lian xiang wang yu
..............
page:38,40
Success End of Security Chip for Terminal Equipment
CUI Guang-yao
..............
page:36-37
Development Trend for UTM
Jens Andreasssen
..............
page:35
CNC:Assisting Broadband Olympic Games Speeding up Safety Services
HU Xiao-he
..............
page:34
Observing Information Security from Olympic Games
CUI Guang-yao
..............
page:1
Public Notice on Telecom Service Quality
..............
page:2
Industry Events
..............
page:3-4
How to Show the Best of Itself-Changes of 2008 Network Security Market
HU Xiao-he;LI Xue
..............
page:5-10
Network Battlefield:A New Game Stage between Countries
LI Xue
..............
page:11-13
How Far From"Secure Operation and Maintenance"?
BAI Jie
..............
page:14-17
Erecting A Secure Thoroughfare for Mobile Information
MU Ying;JIANG Ying
..............
page:18-20
Pioneering Work Changing Destiny
CUI Guang-yao
..............
page:21-22
Information also Needs"Security Check"——Legendsec Experts'Talk on Safety of Olympic Games
wang yu shen zhou
..............
page:23-26
How to Realize"Safety of Network Soul"
HU Xiao-he
..............
page:27-28
One of the Serial Talks on Terminal Security:Admission Control Assures"Intranet in Conformity with the Stipulations"
SUN Yang-bo
..............
page:29,31
Chinasec Experts:Guard the Digital Intellectual Property Right,Assure the Essential Competitive Power of the Enterprise
WANG Zhi-hai
..............
page:30-31
WatchGuard Publishing an Idea on Extensibe Network Security
LI Xue
..............
page:32
Antvirus Hardware Gateway Driving Viruses out of"Gate"
CUI Guang-yao
..............
page:33
An Information Hiding Method with High Capacity for Color Images
LI Wen;GUO Li
..............
page:93-95
Chaotic FH Sequences based on Baker Map
ZHANG Ying;LI Dong-xian;WANG Bin
..............
page:96-98,103
Research on Security of E-Government Network System
WANG Liang;LU Yu;LI Zhi-peng
..............
page:99-103
Security Assurance Operation Framework based on E-Government
ZOU Mao-yang
..............
page:104-105
A Pseudo-random Number Generator Based on Linear Feedback Shift Register
DAI Zu-xu
..............
page:106-107
zheng gao qi shi
..............
page:105