Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2010 Issue 5
Websense Brought Forth Unified Security Framework TRITON
..............
page:33
The Assessment System of Flying Effects Based on Vega
he guan liang ; zhang yuan ; huo jian hua
..............
page:38-40
MII Held Conference on Propaganda and Implementation of "Defense and Management Measures of Communication Network Security"
..............
page:2
Security Management Will Become A"Potential Stock" of the Industry
..............
page:17-18
Development and Innovations of ME Featured Specialty of Information Security and Countermeasures
luo sen lin ; pan li min ; wang yue
..............
page:64-66
Police Communication Equipment Striding from"Analog"to "Digital"——Hytera PDT Digital Trunk Products Go on the Market
..............
page:26
SQL Injection Attack and Detection Technology
zhang bo
..............
page:90-92
"Legend"in Cloud World
..............
page:1
Auto Rate Selection Algorithm in Wireless Mesh Network Based
zhang shuai ; yi ping ; wu tian ; sun dong lai
..............
page:61-63
Speech Endpoint Detection Based on Sub-band Energy Distribution
wei jiang ; zhang peng ; yuan xiao lei
..............
page:50-51,54
Study on Concealed Short Wave Antenna in Composite Vertical Stabilizer
liu na ; wei gao
..............
page:47-49
Steganalysis Based on MPEG Video
zhou ting ; guo jie
..............
page:72-74
A Steganalysis Method of LSB Matching for MIDI Audio
yang bo ; guo li ; wang zuo jie ; wang cui ping
..............
page:87-89
Wisely Lead the In-Advance Opportunity,Jointly Make the Tomorrow——2010 Intel IT Summit Solemnly Held in Beiging
..............
page:23
Creation Enlightenment of Information Security
..............
page:19-20
Chinasec Application in Cellphone R&D Industry
..............
page:28-29
Lay Stress on "Three Preventions",Guarantee the Infosec of Tobacco Website
wu fan
..............
page:30,32
Application of Secure Multi-Party Computation Protocol Based Secret Sharing Scheme
zhu yan feng
..............
page:69-71
Study and Smulation of FC-AE-1553 Network
yu xiao lei ; chen shao zuo ; zhou hu
..............
page:52-54
Detection of Web-site with Trojan Based on HoneyClient
chen ling ; wang zuo jun ; xue zhi
..............
page:75-77
Simulation of DSSS System Based on TCM-8PSK
liu liang ; zhang jie ; li jin
..............
page:44-46
Magazine"Information Security & Communications Privacy" Starts Using Detection System for Improper Academic Literature in Scientific and Technical Journals
..............
page:89
A Novel ESPRIT Method for Estimating Non-Coherent and Coherent Source
zeng ming ; xu jian cheng ; cai hui fu
..............
page:58-60
Solicit Contributions
..............
page:40
Computer Forensics:A Demand in the Making
..............
page:7-9
ming ci shi yi
..............
page:43,49,57,60,63,66,77,83,86
Solution to Protection of Jump Server Group
xu jing
..............
page:31-32
Relations Between Outputs and Inputs of Stream Cipher
wen fei
..............
page:67-68,71
Infinite Attraction of IT Operation and Maintenance
..............
page:15-16
Analyze and Explain the Security Puzzle of "Carried-on" Mobile Official Business
..............
page:24-25
Design and Realization of PCI Interface Based on FPGA
le jian ; chen shao zuo ; wu zuo zuo
..............
page:41-43
Network Security Ushering in the Era of 3G Mobile Communication
dai qin zuo ; wang yun fei
..............
page:34-37
Shanghai Expo:Touch the First Nerve of Logistics Networking Security
..............
page:10-14
Study and Design of Payment Models
shi zuo
..............
page:84-86
Industry Events
..............
page:3-4
VRV BMG Online Professional Management System Released
..............
page:33
Heilongjiang Provincial Secrets Bureau Held Provincial Conference on Equipment, Installation and Use of "Special-purpose Defense System of Security Technology"
cong xiao wei
..............
page:2
Pay Close Attention to Netwar, Raise the Understanding of Information Security and Privacy
..............
page:5-6
Design and Improvement of Electronic-Stamp System
guo hua ; chen gong liang
..............
page:78-80
Implementation of Experimental Platform for MPLS Network Based on Virtual Machine
yang xin zhi
..............
page:55-57
Speed up Implementation of Rectify-and-Reform for Hierarchical Protection of Information Security
guo qi quan
..............
page:21-22
Lenovo Legendsec\'s Whole-network Statistic Solution
..............
page:27,29
Deployment and Security Analysis of DNS
li en bao ; zhang wen dong ; wang chao
..............
page:81-83