Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2009 Issue 6
Transform——the Subject One Has to Face
MU Ying
..............
page:1
Practice on Reinforcement Design of Ship Computer System
MA Chang-lou
..............
page:91
Role-Based 3-D Access Matrix Model
DU Wei;JIANG Xing-hao;CAI Wei
..............
page:88
Reconfigurable Point Multiplication Design Based on FPGA
GUO Xiao-jiang;LIU Yan-ming;LI Ning
..............
page:86
Research on Causal Correlation of Alerts with Confidence Measurement
TANG Chan-na;FAN Lei
..............
page:83
Privacy Enhancement of VeriMed Medical Care System
JIN Xin;WU Yue;LI Lin-sen
..............
page:81
Model Design of Network Covert Channel Detection System
PEI Yong;SHEN Yong
..............
page:78
Construction and Analysis of Shrinking-extended Generator
WANG Jing;WANG Jin-ling;ZHANG Bu-ying;NIU Xiu-yan
..............
page:75
Introduction to Behavior-enhanced Network Management
ZHANG Feng-Jun;MU Qi-Lin;JIANG Hong
..............
page:72
Algebra Complexity Analysis of AES-Class S box and Camellia-Class S Box
GUO Yan-zhen;HAN Wen-bao;HE Kai-cheng;ZHANG Meng
..............
page:69
An Evolutionary Game Analysis of Cooperation among Security Equipments
XIA Zi-chao;YIN Ying;CHEN Xiao-hua
..............
page:67
Study and Application of DRM in IPTV
WANG Jia-xin;HUANG Deng-shan
..............
page:64
Verification and Validation in OPNET Modeling and Simulation
TIAN Hai-fu;GUO Yi-xi;ZHANG Hong
..............
page:60
Design of FIR Filter in MATLAB°TMDSP Integrated Environment
MENG Hui-xia;GENG Jun-mei
..............
page:58
Realization of OLED Display Module in Embedded Linux
TANG Liu-hua;TANG Jian-ming;XIANG Hong-quan
..............
page:55
Study on New System of Information Assurance
XUE Li-min;ZHANG Xia
..............
page:52
Research on Firewall Performance Optimization
YE Zhen-xin;YANG Shu-tang;MA Jin
..............
page:48
Network Security and Key Technoloty
JIANG Jian-guo
..............
page:46
Description of SSX45 Chip
hang tian xin xi gong si
..............
page:44
UBS SDIC Enhancing the Internal Control with Aid of Legendsec's Diary Audit System
..............
page:42
Application of Chinasec Source-Code-Level Data Security Solution in Cellphone Development Enterprises
QU Fei
..............
page:41
CheckPoint Finished Purchasing Nokia's Security Equipment Business
LI Xue
..............
page:40
Web Optimized 2.0 Turning to Management Application Accelerated Service
HU Xian-he
..............
page:39
Leadsec's Security Gateway of Independent Property Right Makes A Stire in RSA Conference
..............
page:38
Multi-level Security Access Control Model Based on Trusted Computing Platform
TANG Wei;LU Song-nian;YANG Shu-tang
..............
page:93
Application Research of Commercial Cryptography in Digital TV
GUO Bao-an;LUO Shi-xin;YU Zhi-qiang
..............
page:97
Design and Implementation of Multicore-based Security Gateway
WANG Zhi-min;YANG Cong-yi
..............
page:101
Quantization preprocessing of Continuous Variable Quantum Key Distribution
ZHENG Ping-yun;HUANG Chun-hui
..............
page:105
Technology Research of Commercial Cryptography in Broadband Wireless Mobile Communications
GUO Bao-an;WANG Lei;XU Shu-min
..............
page:108
Bayesina Network Anomaly Detection Based on Time Slicing
LIU Tao;QI Ai-ling
..............
page:112
Prepare to Construct Security "Castle" for the User
HU Xiao-he
..............
page:36
Advantech: Cross-band Conforming, Favoring the Customer
shuo hua ke ji gong si
..............
page:34
Development Trend and Security Exploration of Mobile Commerce
rui tong gong si
..............
page:32
ISMS Ushered In New Development Opportunity
LI Xue
..............
page:28
Fish and Bear's Paw, Have Both at the Same Time——Convenience and Security of Remote Office Work
BAI Jie
..............
page:22
What's in Highest Price of 21st Century? Information, Information Security——Interpretation of Contemporary Data Encryption and Secure Storage
HU Xian-he
..............
page:14
3G, the World In Hand
WU Zhen
..............
page:9
Innovation and Security, Two Seesaws for Cloud Computing
XUE Qian
..............
page:5
Implementation Method for Interact Network Security Information Circulation
..............
page:2