Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2009 Issue 3
Change, the Need for Security
Mu Ying
..............
page:1
LIU Yunshan: Try Hard to Build up Healthy and Upward Network Cultural Environment
..............
page:2
The Standing Committee Conference of the State Council Reviewed and Approved the Readjustement and Development Plan of Electronic Information Industry
..............
page:3
Successfully Going on the Stock Market of "New Sanban" Brings Not Only the Luck
HU Xiao-he
..............
page:5
Shadow That Is Hardly to Be Removed by "Happy Time"
BAI Jie;WU Zhen
..............
page:6
It Will Soon Bc the Virtualization Age
HU Xiao-he
..............
page:14
Security Evaluation of e-Bank: Let the Defence More Precise and Accurate
HU Xiao-he
..............
page:18
WiFi, Let You Be Both Happy and Worried
XUE Qian
..............
page:19
Leadsec Published New Channel Policy and Tried to Open Application Security Market
LI Xue
..............
page:23
Networks' Malicious Information Exhibits Pluralistic Development
LI Xue
..............
page:25
Olympic Games Rounded off Venustech Returned with Great Honor
XUE Piang
..............
page:26
Networks From Now On Be Strongly Fortified
HU Xiao-he
..............
page:28
SECworld's SecFox Assisting China Industry's "Lianghua" Fusion
wang yu shen zhou
..............
page:29
The Whole Network Deployment, the Integrated Security, and Simplification the Foundation
qi ming xing chen gong si
..............
page:31
Overview on Jump's SSL VPN Gateway Technology
HE Jian-feng
..............
page:33
Two Basic Problems to Information Classified Security Protection*
CHEN Xue-xiu;REN Wei-hong;XIE Chao-hai
..............
page:36
Congestion Control Algorithm Based on Cybernetics
WANG Qian;DONG Shu-fu
..............
page:40
Screen Image Sharing Technology in CSCW Environment Based on Image Matching and Compensation Method
PENG Xiao-ping;ZHANG Xin-jia
..............
page:44
Implementation of PSTN/ISDN simulation based on IMS Frameworks
ZENG Xi
..............
page:47
Information Service-oriented Identity Authentication and Authorized Access
YANG Mei
..............
page:50
Study on AFDX Queue Management Algorithm based on Differentiated Service
DUAN Hui-qing;ZHNAG Yuan;SHI Ji-zhao
..............
page:53
CPK Authentication and Its Application in the Digital College Campus System
GAO Jie
..............
page:56
Financial IC Card Authentication System and Its Security Analysis
FENG Zhi-xing;LI Jian-hua;WANG Yi-jun
..............
page:58
Technology of Hidden Process Rootkit on Win32
LIN Wei-liang;WANG Yi-jun;XUE Zhi
..............
page:62
LAN Access and Authentication Scheme Based on 802.1x
LIU Hai-wang;QIU Wei-dong;HUANG Zheng
..............
page:64
Research and Realization of Public Transportation Query system based on WAP
WANG Jian;ZHAO Zheng-wen;FAN Xiao-xiang
..............
page:66
Client Honeypot Principle and Application Research
FAN Xun;WANG Yi-jun
..............
page:69
A Route Management System Based on Routing Protocol Analysis
YANG Shan;CHEN Kai
..............
page:72
A FPGA-based Design of Multiplexer to Extract VC-12 from STM-4
LI Ying
..............
page:74
Prediction on Semantic Orientation of Texts Based on Topic Correlation"
LAI Huo-yao;LIU Gong-shen
..............
page:77
Development and Prospects of Trusted Computing
ZHU Hai-wei;SHI Lei
..............
page:79
The Analysis of the Connection from BU-61580 To DSP
FU Kun;CHEN Shao-wei
..............
page:82
Design of Wireless Data Transmission System based on nRF905
GUAN Ke;SHENG Hui-xing;WANG Hai-bin;YIN Ming
..............
page:85
Safety Measure of RIA Streaming Media Interactive System——The Edge Server Deployment*
QIN Zu-jun;JI Qin-geong;LIN Guo-ying
..............
page:88
Optimal Design on Rule Base of Snort Based on Postal Comprehensive Network*
ZHANG Hong-yu;JIANG Wen-bao;LIU Bao-xu
..............
page:93
Initiative Defense Research Based on Log Analysis of Honeypot
LI Jing;SHI Tong;XUE Zhi
..............
page:96