Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2010 Issue 12
Network Crime Forensic Technology Faces New Challenges
XU Rong-sheng
..............page:13,15
Identity-based Strong Designated Verifier Signature Scheme
HUANG Yu-ying;SHENG Zheng-yao;SHI Lai-jing
..............page:102-103,109
Development of Application Technology System for Infrastructure
TAN WU-zheng;YANG MAO-jiang
..............page:106-109
Study on Secure System Architecture of IOT
GUO Li;YAN Bo;SHEN Yan
..............page:73-75
Bypass-type DNS Realizing Plug-and-Play of Access Control
GUO Yong-heng
..............page:51
Design and Implementation of RS Decoder Based on FPGA
MO Xin-kang;NIU Qiang-jun;SONG Jia-you
..............page:84-85,88
Study on Trusted Application based on Trusted Computing
SHI Yuan-bing
..............page:92-94
Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity
DONG Xin-feng;ZHANG Feng-rong;QIAO Tong-xu;ZHANG Wen-zheng
..............page:112-115
Network Test &Evaluation Practice based on Hierarchical Protection
CHEN Guang-yong;ZHANG Jie-xin;GUO Cuan-nan
..............page:47-48
Future Network and Novel Router
NAN Xiang-hao;XIE Jian-ping;LIU Ya-dong;ZHAO Jian-guo
..............page:62-64,70
Exploration on Configuration and Application of H3C Firewall
YANG Liu;YU Hui
..............page:98-99,101
xin xi dong tai
..............page:2-9,83,91
Cloud Computing Security
SHEN Chang-xiang
..............page:10-12,15
Pilot Channel Estimation-based Algorithm of MIMO Synchronization
CUI Jin;LI Shu-jian;ZHANG Yan
..............page:86-88
Information Cancellation of Storage Media and Application
LE Wen-bin;CHEN Xiang-pan
..............page:100-101
Study on All-optical Network Security Technologies
DAI Ling-lin;ZHANG Chi;WANG Wen-sheng
..............page:71-72,75
Security Server
LI Wei
..............page:21-22
Indenpendent Controllability Doesn\'t Equal Security
DU Yue-jin
..............page:16-17
Design and Realization for Trusted Access of Heterogeneous Wireless Networks
ZHANG Ke-li;LI Xin
..............page:104-105,109
Secure Storage and Cloud Storage Security
WANG Hui-bo
..............page:18-19
Design & Realization of Network Videocon Based on ARM and Linux
LIU Di-jun;ZHONG Hong
..............page:76-77,80
System Design of SM2 Engine in Trusted Cryptographic Module
LI Zheng;YANG Xian-wen;TIAN Zhi-gang
..............page:95-97
Development of High Data-Rate Underwater Acoustic Communications
HE Cheng-bing;HUANG Jian-guo;ZHANG Qun-fei
..............page:81-83
Security System Construction Program in information Office-work Network
DUAN Ping;ZHANG Tong-tong
..............page:57-58
How the Law Keeps the Door for Network Security
LIU Pin-xin
..............page:14-15
Bell-Lapadula and Biba-based Modified Security Model and Its Application
WANG Chao;CAI Mao-jie
..............page:45-46
AGM Algorithm and Its Fast Implementation
ZHANG Wen-ke;LI Yuan-zheng
..............page:110-111,115
Developing Internet Banking Speeding up Financial Innovations
TAO Hui;JIANG Shao-xiong
..............page:119-122
Study of Threshold-based Double-level Algorithm for Reduction of PAPR
LI Nan;ZHANG Hua-wei;LIU Jin-hu
..............page:89-91