Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2009 Issue 10
ye jie dong tai xin xi
..............page:6
New Products
..............page:42
A Unified Software Bug Pattern Description Language for Static Analysis
LI Chao-jun;JIANG Fan
..............page:105-107
Application of CLV System in Telecom Marketing
ZHANG Yong-hui;YANG Ben-zhao;CHEN Cai-yun
..............page:108-110
Study on General Characteristics of ARP Broadcast Flow
YU Su;DENG Yu
..............page:83-85
Study on OTP Authentication System Resynchronization
ZHANG Jian-rong;LIU Jian-wei
..............page:86-87,94
Analysis and Prevention of Computer Virus
DUAN Ai-ling;SUN Xia
..............page:88-90,94
Process Integrity and Its Application in Software Vulnerability Testing
ZENG Fan-ping;CHEN Ming-hui;YIN Kai-tao;WANG Xu-fa
..............page:91-94
Security of E-Bank Identity Authentication System Based on Hardware
CHENG Yu-xian;YUAN Yi;XUE Zhi
..............page:95-98,104
Eliminating Ability and Correlation of Random Statistical Test
HUANG Jia-lin;LAI Xue-jia
..............page:43-46
Information Security Risk Assessment Approach Based on STRIDE Threat Model
HE Wei;TAN Shu-guang;CHEN Ping
..............page:47-49
Research on Network Security Assessment
XU Wei-sheng;ZHANG Bao-wen;LI Sheng-hong
..............page:50-53
Design and Implementation of Anti-Trojan Horse System
NIU Hua-wei;YU Jing
..............page:54-56
Text Classification and Clustering Based on Ant Colony Algorithms
LI Yan;ZHANG Yue-guo;LI Sheng-hong
..............page:57-58,61
Feasibility of NAS Application in Military Communication Network
PI Li-cai;LIU Yu
..............page:59-61
Power Allocation in Cooperative Relays Based on Space-Time Code
LI Yi;QIU Ling;LIU Wei-ping
..............page:62-63,67
Measurement and Analysis of GSM Signal
LI Hui;ZHAO Zhong;HUANG He;WANG Ting-liang
..............page:64-67
Security Design of Intelligent-Card Applied in Campus
HOU You-li
..............page:73-74,77
Analysis of Security Problems in Development of Cloud Computing by Telecom Operator
LI Lei;WANG Jin-lun;WANG Wei;ZHAO Li-ping
..............page:75-77
Research on Security Scheme of Mobile Business
SUN Xiao-han
..............page:78-79
HTTPS Session Hijacking Based on SSLStrip
ZHANG Heng-jia;SHI Yong;XUE Zhi
..............page:80-82
Design and Implementation of Risk Assessment Management System
TANG Yin;SUN Fu-ming;MA Wei-dong
..............page:102-104
Research on An Attack Method Aiming at Web Email
SONG Qi;SHI Yong;XUE Zhi
..............page:99-101,104
EC Security Experimental Teaching
WANG Yu-ying
..............page:111-112,117
Applications of Virtual Machine in Network Security Experiment Teaching
DING Yu;ZHUANG Cheng-shan
..............page:71-72