Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2010 Issue 2
Opportunity for Multi-level Protection Prying up A New Start of Security Industry
..............
page:32
Experienced Wind and Rain, At Long Last Saw Rainbow——Westone Corp., Ltd. Passed CMMI Certification
..............
page:33
DLP——Vanguard of Infosec Development
..............
page:43-44
Discrete Text Classification and Clustering for Public Opinion Analysis
li hai yan ; li sheng hong ; zhang yue guo
..............
page:65-67
Chinese Enterprise Network Information Security Risk Analysis
gou you lai ; zhou zuo
..............
page:88-89
Design and Implementation of Anti-Virus Engine Based on Multicore Firewall
xu hao ; zhou li bin
..............
page:95-96,99
Application of Digital Watermark in Transmission of Plane Media
cao zhong ; li xiang ; wang shi lin
..............
page:90-91,94
A Stateful Firewall Model Based on Modified Decision Trees
zhang kai yu ; lu song nian
..............
page:82-83,87
Two-way Authentication of Event-based One-time Password
wang guan ; liu jian wei
..............
page:79-81
Should GSM Cipher Be Cracked Globally 3-Billion Mobile-Phones Would Fear of Being Eavesdropped
..............
page:30-31
Application and Development of VPN Technology
shi lu
..............
page:56-58
Evolution-and-Fusion Is An Inexorable Trend for On-network Behavior Management Products
zhao wei dong
..............
page:42
Infosec Certification Has Got Its "High-level Expert Team"
..............
page:27-29
Discussion on Information Security of Training Organization
hu shuo bing
..............
page:76-78
End-point Security Authentication Technology and Its Development
zhu peng ; xie xin ; zhou xian jing ; chen shang yi
..............
page:52-55
Discussion on Properties of State Secrets
yan xue lin
..............
page:49-51,55
Obstacle-clearing for e-Payment "Security"——One Cannot but Go Ahead
..............
page:11-15
CAI Ming-zhao: Global Network Security Could Not Be Measured by Only One Standard
..............
page:2
Enterprises\' Security Planning Should Take Precautions against Seven Wrong Understandings
..............
page:21-23
Last Grand Cryptography Event in 2009
..............
page:5-6
Hash-based Pair-wise Key Pre-distribution Scheme for Ad hoc Network
zhang jin ying ; yan xi shan ; wang jian wen
..............
page:97-99
ZHANG De-jiang: Strength Network Security Management Consolidate TD in A Big Way
..............
page:2
Security Enterprises" Coming into the Market under the Multi-level Capital Market——An Interview with ZHANG Ai-ping. The General Business Supervisor of Qi-Lu Stock Investment Bank
..............
page:24-25
Virus-killing Software VS Microsoft Win7——Joining Hands or Replacing?
..............
page:19-20
Foreign Enterprises, with Personnel to Build up "Local Consolidation"
..............
page:16-18
Industry Events
..............
page:4
No Regulations, No Security
..............
page:1
MII Spokesman Answering Reporters" Questions on Network-hacker Attack
..............
page:3
China\'s Present Situation and Future Development of e-Payment Security
..............
page:34-35
Nationz Technologies Inc. Timely Building up Master-control Chip Series of Secure U-disk
..............
page:36
Biometric: Standard and Industry Should Run Neck and Neck——Biometric Standard Work-group of National IT Standard Committee Formally Starts Its Business
..............
page:26
Lenovo Legendsec Lending New-value Times of Information Security
..............
page:38-39
How to Deal with the "7 Wrong Understandings" of Computer Security Conception
..............
page:37,39
VRV\'s Technical Scheme for Intranet Security Protection——VRV\'s Intranet Security Management System
..............
page:40-41
A Best Relay Selection Scheme Based on Cooperative Communication
gu wen shan ; zhang hui sheng ; li li xin ; xu yi biao
..............
page:59-61
Network Security Event Monitor Based on Event Stream System
shen jian yu ; li jian hua ; zhang yue guo
..............
page:92-94
A Real-time Video Watermarking Algorithm for Copyright Protection In Q-DCT Domain
zuo wei ; jiang xing hao ; sun zuo feng
..............
page:70-72
Research Progress on Association Analysis
chen yu ; zhang bao wen ; he de quan
..............
page:84-87
Storm of Search Engine, A Prelude to Netwar?
..............
page:7-10
Design and Study of White-Box Cryptography
lai xue jia ; xiao ya ying
..............
page:45-48
SSIFT: An Improved SIFT Descriptor for Chinese Character Recognition in Complex Images
jin zhen ; qi kai yue ; chen kai
..............
page:62-64
Implementation and Performance Analysis of SC-FDMA System in LTE Project
li ju lin ; zhang jie
..............
page:68-69,72
A Demand-oriented Mutual Authentication System Based on ITU-T Identity Management
kong fan qiang ; liu jian hua ; fan jiu lun
..............
page:73-75