Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2009 Issue 6
Transform——the Subject One Has to Face
MU Ying
..............page:1
Role-Based 3-D Access Matrix Model
DU Wei;JIANG Xing-hao;CAI Wei
..............page:88
Reconfigurable Point Multiplication Design Based on FPGA
GUO Xiao-jiang;LIU Yan-ming;LI Ning
..............page:86
Privacy Enhancement of VeriMed Medical Care System
JIN Xin;WU Yue;LI Lin-sen
..............page:81
Model Design of Network Covert Channel Detection System
PEI Yong;SHEN Yong
..............page:78
Construction and Analysis of Shrinking-extended Generator
WANG Jing;WANG Jin-ling;ZHANG Bu-ying;NIU Xiu-yan
..............page:75
Introduction to Behavior-enhanced Network Management
ZHANG Feng-Jun;MU Qi-Lin;JIANG Hong
..............page:72
Algebra Complexity Analysis of AES-Class S box and Camellia-Class S Box
GUO Yan-zhen;HAN Wen-bao;HE Kai-cheng;ZHANG Meng
..............page:69
An Evolutionary Game Analysis of Cooperation among Security Equipments
XIA Zi-chao;YIN Ying;CHEN Xiao-hua
..............page:67
Study and Application of DRM in IPTV
WANG Jia-xin;HUANG Deng-shan
..............page:64
Verification and Validation in OPNET Modeling and Simulation
TIAN Hai-fu;GUO Yi-xi;ZHANG Hong
..............page:60
Design of FIR Filter in MATLAB°TMDSP Integrated Environment
MENG Hui-xia;GENG Jun-mei
..............page:58
Realization of OLED Display Module in Embedded Linux
TANG Liu-hua;TANG Jian-ming;XIANG Hong-quan
..............page:55
Study on New System of Information Assurance
XUE Li-min;ZHANG Xia
..............page:52
Research on Firewall Performance Optimization
YE Zhen-xin;YANG Shu-tang;MA Jin
..............page:48
Network Security and Key Technoloty
JIANG Jian-guo
..............page:46
Description of SSX45 Chip
hang tian xin xi gong si
..............page:44
Multi-level Security Access Control Model Based on Trusted Computing Platform
TANG Wei;LU Song-nian;YANG Shu-tang
..............page:93
Application Research of Commercial Cryptography in Digital TV
GUO Bao-an;LUO Shi-xin;YU Zhi-qiang
..............page:97
Design and Implementation of Multicore-based Security Gateway
WANG Zhi-min;YANG Cong-yi
..............page:101
Quantization preprocessing of Continuous Variable Quantum Key Distribution
ZHENG Ping-yun;HUANG Chun-hui
..............page:105
Bayesina Network Anomaly Detection Based on Time Slicing
LIU Tao;QI Ai-ling
..............page:112
Prepare to Construct Security "Castle" for the User
HU Xiao-he
..............page:36
Advantech: Cross-band Conforming, Favoring the Customer
shuo hua ke ji gong si
..............page:34
Development Trend and Security Exploration of Mobile Commerce
rui tong gong si
..............page:32
ISMS Ushered In New Development Opportunity
LI Xue
..............page:28
3G, the World In Hand
WU Zhen
..............page:9