Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2010 Issue 10
RSA President Art Coviello: Considering First the Risk and Then the Security
..............
page:30
Research on Improving the Speed of RSA Algorithm
MA Chang-sha;HU Ai-qun
..............
page:80-82
Security is the Goal Realization Relies on Service——Neusoft Released New Frame of NetEye Infosec Service
..............
page:27-28
What the Law could Do before the Netwar
..............
page:9-10
Persistence in Expectation——Highly Qualified Personnel of Information Security
..............
page:1
HOW to Do Well the Bank\'s Risk Evalution
WANG Li-jin
..............
page:32-33
Advantech Put out Atom Bi-kernel Embedded Industry Control Machine Without Electric Fan
..............
page:42
Study on Windows Legal Process Information Injection and API Hook Techniques
XU Si-ming;XUE Zhi
..............
page:61-63
Study of Digital Image Encryption Secure Transmission based on Chaotic Systems
WEN Fei
..............
page:86-87,91
Application of Jump\'s Firewall in the Campus Networks of Higher Learning Institutions
ZHANG Yong
..............
page:34-35
Implementation and Optimization of DES in DSP
YU Guang-wei;HE Wen-cai;DUAN Xiao-yi
..............
page:64-66
Check Point Put out Applied Control Software Blade
..............
page:31
Inspur Yingxin Security Server Building up Security Computing Environment
..............
page:18
Study on End-to-End Distortion Estimation in Video Image Communication
CHU Hong-yun;XIE Zheng-guang
..............
page:57-58,63
Questions & Answers in Web Security (4)
..............
page:16-17
Analysis on the Frequency Interference of TD-SCDMA System
JIANG Chu-jiang;XU Yong-ming
..............
page:59-60,66
(2,2)Visual Cryptographic Scheme Based on Error Diffusion Algorithm
NIU Dong-mei
..............
page:76-77
Implementation of High-speed Data-flow Security System
SONG Guo-dong;LI Guo-yang
..............
page:36-37
Unifying the Security Management Perfecting the Security Assurance System——Take the SOC Road with Chinese Characteristics (1)
..............
page:28
xin xi dong tai
..............
page:3-4,33,43-52,63
Building up the Security Storage Following Closely the Development of Cloud Technology——Westone\'s Security Storage System and Application Solution Released in Beijing
..............
page:13
Design of a Novel WCDMA Mobile Phone Antenna
SHANG Yong;LUO Xin;WANG Min-xi
..............
page:53-54
New Opportunity, New Challenge, and New Starting Point——Interview With Vice General-manager REN Yu-xia of Chengdu 30RTOM Venustech Column-Web Security Knowledges
..............
page:14-15
Study on County-level e-Government Security Management
WANG Rui-gang;ZHU Zhi-xiang
..............
page:70-72
The Gentleman Becomes Flourished for His Honesty and Kindheartedness The Compatriot Seeks after Astuteness and Rourcefulness for Stability——30SAN\'s Development Planning and Strategies
HUANG Nan-ping
..............
page:20-21
Cool Thinking on 2010 Security-profitable Industry
..............
page:11-12
A Dual-Physical Channel-Based Security Access Technology for Video Monitoring System
LI Xin;WU Xu-dong;WANG Zhi-hai
..............
page:83-85
Digital City-Leading Life Conception of the Times
..............
page:22-26
Joint Detection Algorithm Based on Klman Filter
LI Shi-tao;XIAO Yong-gang;SUN Ye-gong
..............
page:98-100
A Transparent Single Sign-on Solution for Web Legacy System
LONG Yi-hong;LI Chang-you;TANG Zhi-hong;LIU Xu
..............
page:67-69,72
Surfilter\'s Fused Products of Internet Management and Terminal Security Series
..............
page:41-42
Study and Summary on Hierarchical Protection Work of Radio Beijing
LIU Shuang
..............
page:19
PRC Wireless Control Regulations
..............
page:2
Research and Design of Security Login Shell in Network Games
CAI Li;SUN Xing
..............
page:95-97,100
Overall Solution for Data Anti-leakage in e-time
..............
page:38-40
Safety Code Design for Website
DAI Ming-xing;CHEN Zheng-kui
..............
page:92-94
Risk Analysis and Control of Classified Information System Integrated Project for Military Industry Enterprises
WANG Qi;XUE Zhi;JIANG Feng
..............
page:88-91
Guard against the Risk of Network-space\'s Being Militarization
..............
page:5-8
A Remote Data Control System Based on GPRS Message Module
CHEN Feng-mei
..............
page:55-56
Information Security Management Platforms Based on ISO 13335
YANG shan;LI yun-xiong;CAO bo;GAO fei
..............
page:78-79
Study and Implementation of Computer Data Secure Deletion
LI Min;ZHOU An-min
..............
page:73-75,77
Discussion on Security Defense Frame for Smart Mobile Phone
..............
page:29-30