Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2010 Issue 2
DLP——Vanguard of Infosec Development
..............page:43-44
Discrete Text Classification and Clustering for Public Opinion Analysis
li hai yan ; li sheng hong ; zhang yue guo
..............page:65-67
Chinese Enterprise Network Information Security Risk Analysis
gou you lai ; zhou zuo
..............page:88-89
Design and Implementation of Anti-Virus Engine Based on Multicore Firewall
xu hao ; zhou li bin
..............page:95-96,99
Application of Digital Watermark in Transmission of Plane Media
cao zhong ; li xiang ; wang shi lin
..............page:90-91,94
A Stateful Firewall Model Based on Modified Decision Trees
zhang kai yu ; lu song nian
..............page:82-83,87
Two-way Authentication of Event-based One-time Password
wang guan ; liu jian wei
..............page:79-81
Application and Development of VPN Technology
shi lu
..............page:56-58
Discussion on Information Security of Training Organization
hu shuo bing
..............page:76-78
End-point Security Authentication Technology and Its Development
zhu peng ; xie xin ; zhou xian jing ; chen shang yi
..............page:52-55
Discussion on Properties of State Secrets
yan xue lin
..............page:49-51,55
Last Grand Cryptography Event in 2009
..............page:5-6
Hash-based Pair-wise Key Pre-distribution Scheme for Ad hoc Network
zhang jin ying ; yan xi shan ; wang jian wen
..............page:97-99
Industry Events
..............page:4
No Regulations, No Security
..............page:1
A Best Relay Selection Scheme Based on Cooperative Communication
gu wen shan ; zhang hui sheng ; li li xin ; xu yi biao
..............page:59-61
Network Security Event Monitor Based on Event Stream System
shen jian yu ; li jian hua ; zhang yue guo
..............page:92-94
A Real-time Video Watermarking Algorithm for Copyright Protection In Q-DCT Domain
zuo wei ; jiang xing hao ; sun zuo feng
..............page:70-72
Research Progress on Association Analysis
chen yu ; zhang bao wen ; he de quan
..............page:84-87
Design and Study of White-Box Cryptography
lai xue jia ; xiao ya ying
..............page:45-48
SSIFT: An Improved SIFT Descriptor for Chinese Character Recognition in Complex Images
jin zhen ; qi kai yue ; chen kai
..............page:62-64
Implementation and Performance Analysis of SC-FDMA System in LTE Project
li ju lin ; zhang jie
..............page:68-69,72
A Demand-oriented Mutual Authentication System Based on ITU-T Identity Management
kong fan qiang ; liu jian hua ; fan jiu lun
..............page:73-75