Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2009 Issue 8
Data Protect Method Based on User\'s Authorization
DONG Li-ming;HE Hong-jun;LUO Li;HE Xiu-xiong
..............page:114-117
Security Analysis of MIFARE System
LI Bai-fan;GU Da-wu;LIU Ya;QU Bo
..............page:118-121
Application of "Cloud security" in Anti-virus Software
SUN Hong
..............page:36-38
Security Risk Assessment of Network Management System
HUANG Ren-liang
..............page:111-113
Research On Video Cryptosystem In Combined Battlefield
WANG Yi-ping;JIANG Wei
..............page:84-87
Situation and Development Trend of Commercial Code Infrastructure
GUO Bao-an;YIN Gang;LUO Shi-xin
..............page:80-83,87
Principle and Countermeasure of Virus Attack
HE Xiu-xiong;HE Hong-jun;LUO Li;DONG Li-ming
..............page:107-110
Technology of the limiting BT traffic on network Based Application Recognition
YANG Lin;YANG Peng;CUN Jiang-tao
..............page:98-100
Analysis and Discussion on Firewall Technologies
JIA Qing;GAO Xiang
..............page:95-97,100
On the Technology for Eliminating Information
SHEN He-lei
..............page:92-94
Development Situation and Trend of Authorization Technology
GUO Bao-an;HE Li;LUO Shi-xin
..............page:88-91
Rootkit Detection Technique Based on NTFS Disk Parse
WANG Ding;ZHANG Xiao-song;LONG Xiao-shu
..............page:200-202,205
Analysis and Improvement of Hash Chain Mechani sm of Sead Protocol
WU Wan-feng;WANG Ru-chuan;HUANG Hai-ping;SUN Li-juan
..............page:196-199
A Cluster-Based Time Synchronization Algorithm for WSN
LIU Wei-ping;WANG Pei-kang;FANG kai
..............page:50-52
A New Coherent Sources DOA Estimation With High Resolution and Stability
CAI Hui-fu;HUANG Deng-shan
..............page:47-49
Reliability Analysis and Data Maintenance Optimization of P2P Durable Storage System
WU Teng;XUE Lei;ZHENG Dong;LIU Xiao-guang
..............page:149-153
Application of Information Resource Panning Technology in Multi-Level Protection
LI Hong-min;LING Rong-hui
..............page:145-148,153
Analysis on Security Attribute of Security Protocol Components in Symmetric Environment
DENG Fan;DENG Shao-feng;LI Yi-fa
..............page:141-144
Safety and Defence Technology of Important Communication Device
ZENG Ling;WANG Su-ling
..............page:165-166,171
Virus Risk Analysis of Smart Phone
LI Kai;LIU Yi-ming
..............page:162-164
Overview on Development of WEB Services Security
CHEN Hao;WANG Yun-bing
..............page:159-161
Design of Efficient Reliable Storage System for Disaster Recovery
JIAO Chao;ZHOU Tian-tong;LI Xiang-xue;LI Jian-hua
..............page:122-125
Design of Smart Card Security Frame Based on Trusted Computing Theory
ZHANG Lu-guo;LI Zheng
..............page:126-129,144
A DiffServ-based Secure Network Access Scheme for MIPv6
XING Hong-zhi;LUO Chang-yuan;HUO Shi-wei
..............page:134-136
Security Enhancement of MIFARE Classic
QU Bo;GU Da-wu;LIU Ya;LI Bai-lan
..............page:137-140
Research on Trust Model of P2P Network
LIU Yi-ming;LI Kai;QIU Min
..............page:156-158
Study of Neumann-Hoffmann Decode for GPS L5 Signal
ZHAO Hong-wei;LIAN Bao-wang;FENG Juan
..............page:44-46
Survey on Network Access Control Architecture
YU Sheng;ZHU Lu
..............page:41-43
Quantum Leading New Trend of Secure Communication
CHEN Hui;ZHU Fu-chen
..............page:39-40,43
Identity-based Authentication System in Multi Trust Domain
YANG Yu;TAN Ping-zhang;LI Lei;ZHOU Lian-song
..............page:193-195,199
Security Scheme based on IPSec for Fast Handoff
ZHAO Lei;LI Xiao-ping;DONG Qing-kuan
..............page:189-192
Biometric Identification Technology and Its Military Application Prospect
CHEN Qian;REN Jian-yong
..............page:183-185
Analysis of Security Problems and Suggestions of Space-Based Synthesis Informat ion Network
WANG Sheng-yin;WENG Huai-rong;XIE Shang-ming
..............page:172-174
Chaotic Pseudo-random Sequence Generation Algorithm
DONG Bin-hui;ZHOU Jian-Yong;HUANG Jin-Yuan
..............page:327-330
ID-Based Group Key Agreement Protocol for Ad Hoc Networks
CHEN Da;ZHANG Min;CHEN Qin
..............page:334-337
Industry Events
..............page:3-4
zheng gao qi shi
..............page:58
A Key Encapsulation Scheme based on Fingerprint and Smartcard
LUO Cheng-hang;YANG De-xin;YANG Bo
..............page:338-340,344
Definition of Subliminal-Free Cryptosystems Based on Probabilistic Turing Machine Model
DONG Qing-kuan;LI Xiao-ping
..............page:320-322,326
Research Strategy of DNA Words Design Based on Computer Filtration
LIU Hong-yu;YOU Zi-li;HUO Jia-jia;ZHANG Wen-zheng
..............page:323-326
Success Ratio of Key Distribution Based on Wireless Network
LI Bin;XU Meng-ming;AN Hong-zhang
..............page:290-292,296
One Kind of Sbox Constuucted Specially
CAO Yun-fei
..............page:265-267
Analysis of Multi-value Additive Combined Generator
LIAO Cui-ling;YU Zhao-Ping
..............page:268-270,275
A Multi-layer Identity Authentication Scheme Combining Biological Feature and Public Key Cryptosystem
ZHANG Qing-nan;HUANG Hao;DENG Lei-sheng
..............page:271-275
Research on Methods to Combat Non-Credible Software Based on Virtual Machine Technology
LONG Xiao-shu;ZHANG Xiao-song;WANG Ding
..............page:203-205
Implementation of AVISPA Tool
XU Meng-ming;LI Bin;XIAO Cong
..............page:154-155,158
Authentication System Incorporating Biometrics and Cryptography
LI Hong;QIN Yu
..............page:175-178,182
Status quo and Evaluation of Traceback in Cyber-Network
CHEN Zhou-guo;ZHU Shi-xiong
..............page:179-182
A Quantified Method for Risk Assessment Elements of Information Security
ZHOU Quan;LEI Fang-hua;LI liu-hao
..............page:209-213
Research on Application Model of File System Filter Driver in Intranet Security
LIU Fei;ZHANG Xiao-song;LIAN Bi-ying
..............page:214-216,220
A Methodology to Detect Malware Based on NDIS
LIAN Bi-ying;ZHANG Xiao-song;LIe Fei
..............page:217-220
Analysis and Improvement of Waters\' IBE Scheme
HUANG Shuang;XU Chun-xiang
..............page:221-223,227
Analysis of Wireless Ad hoc Multi-channel and Security
ZHAO Chuan-xin;WANG Ru-chuan;HUANG Hai-ping
..............page:224-227
Multi-scale Spatial Detection of Distributed Stealthy Traffic Anomaly
LI Zong-lin;LIU Yao;YAO Xing-miao;HU Guang-min
..............page:228-231,235
Study and Impiementation of An Attack Method Based on Dynamic TDMA Slot Ass ignment
TANG Jing;WANG Ru-chuan;HUANG Hai-Ping
..............page:232-235
An Improved PageRank Algorithm for Combating Link-based Web Spam
ZHANG Fu-zhi;SHI Zhan-wei;Guo Xue-min
..............page:77-79
Exploration on Cyber Security in Information Times
ZHAO Qing-xiang;LIU Zi-qiang;JIN Yong-jie
..............page:74-76
Random Forest Similarity-based Intrusion Detection
WANG Hong;YAN Hai-zhen
..............page:70-71,73
Influence of A-Law Companding Characteristic on Small Signals Added to Big Signals
PAN Jia-yi;LI Qian;HU Ai-qun
..............page:67-69
Scheme of Instant-open E-lottery Based on Trusted-third-party
SUN xiao-han
..............page:65-66,69
QoS Implementation
YANG Jun-song
..............page:56-58
Link Design of UAV Communication based on UWB
HUANG Zhi-qing;WANG Wei-dong
..............page:53-55
Security Design Scheme of Communication Protocol based on Application Layer
HE Ying-wei;DENG Xiao-yan;JI Qing-bing
..............page:62-64
Secure Edwards Curves over F2
LI Jing;PENG Guo-hua
..............page:293-296
Identity-based Short Signature Scheme in WSN
ZENG Meng-qi;QING Yu;TAN Ping-zhang;YANG Yu;ZHOU Lian-song
..............page:297-300
Analysis of Decimated Sequences
LIAO Cui-ling;YU Zhao-Ping
..............page:301-302,305
Security Schemes of Symmetric Key Distribution in Mobile Communications
HOU Jia;LUO Min;LI Bin
..............page:281-284
Quantum Secure Communication and Information Security
CHEN Hui;LIU Yao
..............page:303-305
Application of Data Mining in Behavior Trust Research
WU Xiao-nian;ZHOU Sheng-yuan
..............page:243-245,249
An Attack Based on MPR Nodes in OLSR Routing Protocol
CHEN Guo-wei;SUN Li-juan;WANG Ru-chuan;HUANG Hai-ping
..............page:236-239
Automatic Test Scheme for Cipher Synchronization Probability of Trunk Information Protection Device
LI Ting-sheng;XIANG Hong-quan;ZHOU Xiao
..............page:285-287
Automatic Verification for Cryptographic Algorithm
DONG Zhong-lin;SU Xian-hai
..............page:288-289
Simulation and Analysis of DCF/PCF in IEEE 802.11
MENG Chong;SUN Li-juan;WANG Ru-chuan;HUANG Hai-ping
..............page:240-242
Exploration on DNA Encoding Technique
HUO Jia-jia;YOU Zi-li;LIU Hong-yu
..............page:276-278
Techniques of Data Link Security
WANG Su-ling;WANG Yun-bing;JIANG Wei
..............page:279-280,284
Performance Analysi s of Disaster Recovery Storage System Based on Reed-Solomon Code
ZHOU Tian-tong;XUE Lei;ZHENG Dong;TONG Tian-hao
..............page:246-249
Applications of Trust Model in Safety Management of Mobile Agent
LI Hui;WANG Lan-qin;LIU Na
..............page:250-253
Architecture Design of Network-based Attack Signature Automatic Generation System
XU Yi-fu;HU Hua-ping;LIN Bo-gang
..............page:254-257
A Mutual Authentication Protocol for Low-cost RFID Tag
LI Ya-li;GU Da-wu;ZHAO Jian-jie
..............page:306-308,312
FCSR-based Keystream Generator with Double-Filters
DONG Li-hua;ZENG Yong;HU Yu-pu
..............page:309-312
Forward-Secure Public Cryptosystem Based on a Simple Public Cryptosystem
LI Cheng-bang;HU Ke-liu;XU Chun-xiang
..............page:313-315
Provable CPK-based Group Key Exchange Protocol
DENG Shao-feng;DENG Fan;LI Yi-fa
..............page:316-319
Some Opinions on Research of Quantum Cryptography
ZHU Fu-chen
..............page:258-259
Least Periods Computing of Some Classes of Periodic Sequences
QIAO Tong-xu;ZHANG Wen-zheng;ZHU Shi-xiong
..............page:260-264,267