Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2010 Issue 10
Research on Improving the Speed of RSA Algorithm
MA Chang-sha;HU Ai-qun
..............page:80-82
What the Law could Do before the Netwar
..............page:9-10
HOW to Do Well the Bank\'s Risk Evalution
WANG Li-jin
..............page:32-33
Implementation and Optimization of DES in DSP
YU Guang-wei;HE Wen-cai;DUAN Xiao-yi
..............page:64-66
Study on End-to-End Distortion Estimation in Video Image Communication
CHU Hong-yun;XIE Zheng-guang
..............page:57-58,63
Questions & Answers in Web Security (4)
..............page:16-17
Analysis on the Frequency Interference of TD-SCDMA System
JIANG Chu-jiang;XU Yong-ming
..............page:59-60,66
Implementation of High-speed Data-flow Security System
SONG Guo-dong;LI Guo-yang
..............page:36-37
xin xi dong tai
..............page:3-4,33,43-52,63
Design of a Novel WCDMA Mobile Phone Antenna
SHANG Yong;LUO Xin;WANG Min-xi
..............page:53-54
Study on County-level e-Government Security Management
WANG Rui-gang;ZHU Zhi-xiang
..............page:70-72
A Dual-Physical Channel-Based Security Access Technology for Video Monitoring System
LI Xin;WU Xu-dong;WANG Zhi-hai
..............page:83-85
Joint Detection Algorithm Based on Klman Filter
LI Shi-tao;XIAO Yong-gang;SUN Ye-gong
..............page:98-100
A Transparent Single Sign-on Solution for Web Legacy System
LONG Yi-hong;LI Chang-you;TANG Zhi-hong;LIU Xu
..............page:67-69,72
PRC Wireless Control Regulations
..............page:2
Research and Design of Security Login Shell in Network Games
CAI Li;SUN Xing
..............page:95-97,100
Safety Code Design for Website
DAI Ming-xing;CHEN Zheng-kui
..............page:92-94
A Remote Data Control System Based on GPRS Message Module
CHEN Feng-mei
..............page:55-56
Information Security Management Platforms Based on ISO 13335
YANG shan;LI yun-xiong;CAO bo;GAO fei
..............page:78-79
Study and Implementation of Computer Data Secure Deletion
LI Min;ZHOU An-min
..............page:73-75,77