Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2010 Issue 5
The Assessment System of Flying Effects Based on Vega
he guan liang ; zhang yuan ; huo jian hua
..............page:38-40
SQL Injection Attack and Detection Technology
zhang bo
..............page:90-92
"Legend"in Cloud World
..............page:1
Auto Rate Selection Algorithm in Wireless Mesh Network Based
zhang shuai ; yi ping ; wu tian ; sun dong lai
..............page:61-63
Speech Endpoint Detection Based on Sub-band Energy Distribution
wei jiang ; zhang peng ; yuan xiao lei
..............page:50-51,54
Steganalysis Based on MPEG Video
zhou ting ; guo jie
..............page:72-74
A Steganalysis Method of LSB Matching for MIDI Audio
yang bo ; guo li ; wang zuo jie ; wang cui ping
..............page:87-89
Study and Smulation of FC-AE-1553 Network
yu xiao lei ; chen shao zuo ; zhou hu
..............page:52-54
Detection of Web-site with Trojan Based on HoneyClient
chen ling ; wang zuo jun ; xue zhi
..............page:75-77
Simulation of DSSS System Based on TCM-8PSK
liu liang ; zhang jie ; li jin
..............page:44-46
A Novel ESPRIT Method for Estimating Non-Coherent and Coherent Source
zeng ming ; xu jian cheng ; cai hui fu
..............page:58-60
Solicit Contributions
..............page:40
ming ci shi yi
..............page:43,49,57,60,63,66,77,83,86
Solution to Protection of Jump Server Group
xu jing
..............page:31-32
Relations Between Outputs and Inputs of Stream Cipher
wen fei
..............page:67-68,71
Design and Realization of PCI Interface Based on FPGA
le jian ; chen shao zuo ; wu zuo zuo
..............page:41-43
Network Security Ushering in the Era of 3G Mobile Communication
dai qin zuo ; wang yun fei
..............page:34-37
Study and Design of Payment Models
shi zuo
..............page:84-86
Industry Events
..............page:3-4
Design and Improvement of Electronic-Stamp System
guo hua ; chen gong liang
..............page:78-80
Deployment and Security Analysis of DNS
li en bao ; zhang wen dong ; wang chao
..............page:81-83