Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2009 Issue 3
Change, the Need for Security
Mu Ying
..............page:1
Shadow That Is Hardly to Be Removed by "Happy Time"
BAI Jie;WU Zhen
..............page:6
It Will Soon Bc the Virtualization Age
HU Xiao-he
..............page:14
WiFi, Let You Be Both Happy and Worried
XUE Qian
..............page:19
Networks From Now On Be Strongly Fortified
HU Xiao-he
..............page:28
SECworld's SecFox Assisting China Industry's "Lianghua" Fusion
wang yu shen zhou
..............page:29
Overview on Jump's SSL VPN Gateway Technology
HE Jian-feng
..............page:33
Two Basic Problems to Information Classified Security Protection*
CHEN Xue-xiu;REN Wei-hong;XIE Chao-hai
..............page:36
Congestion Control Algorithm Based on Cybernetics
WANG Qian;DONG Shu-fu
..............page:40
Study on AFDX Queue Management Algorithm based on Differentiated Service
DUAN Hui-qing;ZHNAG Yuan;SHI Ji-zhao
..............page:53
Financial IC Card Authentication System and Its Security Analysis
FENG Zhi-xing;LI Jian-hua;WANG Yi-jun
..............page:58
Technology of Hidden Process Rootkit on Win32
LIN Wei-liang;WANG Yi-jun;XUE Zhi
..............page:62
LAN Access and Authentication Scheme Based on 802.1x
LIU Hai-wang;QIU Wei-dong;HUANG Zheng
..............page:64
Research and Realization of Public Transportation Query system based on WAP
WANG Jian;ZHAO Zheng-wen;FAN Xiao-xiang
..............page:66
Client Honeypot Principle and Application Research
FAN Xun;WANG Yi-jun
..............page:69
A Route Management System Based on Routing Protocol Analysis
YANG Shan;CHEN Kai
..............page:72
Prediction on Semantic Orientation of Texts Based on Topic Correlation"
LAI Huo-yao;LIU Gong-shen
..............page:77
Development and Prospects of Trusted Computing
ZHU Hai-wei;SHI Lei
..............page:79
The Analysis of the Connection from BU-61580 To DSP
FU Kun;CHEN Shao-wei
..............page:82
Design of Wireless Data Transmission System based on nRF905
GUAN Ke;SHENG Hui-xing;WANG Hai-bin;YIN Ming
..............page:85
Safety Measure of RIA Streaming Media Interactive System——The Edge Server Deployment*
QIN Zu-jun;JI Qin-geong;LIN Guo-ying
..............page:88
Optimal Design on Rule Base of Snort Based on Postal Comprehensive Network*
ZHANG Hong-yu;JIANG Wen-bao;LIU Bao-xu
..............page:93
Initiative Defense Research Based on Log Analysis of Honeypot
LI Jing;SHI Tong;XUE Zhi
..............page:96