Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2010 Issue 6
Industry Events
..............page:3-4
Dual-channel Data Acquisition System Based on PCI Bus
zhang yi kai ; wu yong ; wang wen hao ; lei yong
..............page:57-59
Industry Events
..............page:3-4
Dual-channel Data Acquisition System Based on PCI Bus
zhang yi kai ; wu yong ; wang wen hao ; lei yong
..............page:57-59
MIMO-OFDM Channel Estimation of PN Sequence-based Correlation Detection
guo wei ; zhang hui sheng ; li li xin
..............page:48-50
LAN Security Risk Analysis and Prevention
zhang guo qing ; zheng gui sheng ; yu bo
..............page:68-70
Netwar Also Needs "Red and Green Lights"
..............page:12-13,16
Discussion on Mechanism for Backstage Monitors of Android
cai luo cheng
..............page:39-41
MIMO-OFDM Channel Estimation of PN Sequence-based Correlation Detection
guo wei ; zhang hui sheng ; li li xin
..............page:48-50
Netwar Also Needs "Red and Green Lights"
..............page:12-13,16
Study on RBAC Authorization Model Based on Policies
he chang long ; li wei ping ; he jian zhong ; wei ming xin
..............page:77-81
Research and Implementation of Information Comparison System Based on SOA
jin bi fang ; xue zhi ; song tao
..............page:42-44
LAN Security Risk Analysis and Prevention
zhang guo qing ; zheng gui sheng ; yu bo
..............page:68-70
Brief Information
..............page:41,44,47
Comments on "Multi-Core" Security
..............page:5-7
Acoustic Target Location Algorithm Based on Wireless Sensor Network
jiang hang you ; feng yan
..............page:54-56,59
Study on TCP Option Optimization Based on Long Fat Network
huang chen bo ; wu yong ; zhang jian dong
..............page:66-67,70
Discussion on Mechanism for Backstage Monitors of Android
cai luo cheng
..............page:39-41
Design of Self-Test Software for Simulation Platform of Certain Weapon System
zhang hui ; zhang yuan ; huo jian hua
..............page:51-53
Study on Soft-switching Dual-homing and Disaster-tolerant Networking Technology
xu an ying ; wang hao ; jia yue ; liu shu wei
..............page:45-47
Wireless Mobile Office Security Technology Based on WLAN
li guo qin ; jiang yu ; hu ai qun
..............page:63-65,70
Website ID Card——Server Certificate
..............page:28,30
Study on RBAC Authorization Model Based on Policies
he chang long ; li wei ping ; he jian zhong ; wei ming xin
..............page:77-81
Acoustic Target Location Algorithm Based on Wireless Sensor Network
jiang hang you ; feng yan
..............page:54-56,59
Study on Soft-switching Dual-homing and Disaster-tolerant Networking Technology
xu an ying ; wang hao ; jia yue ; liu shu wei
..............page:45-47
Wireless Mobile Office Security Technology Based on WLAN
li guo qin ; jiang yu ; hu ai qun
..............page:63-65,70
Research and Implementation of Information Comparison System Based on SOA
jin bi fang ; xue zhi ; song tao
..............page:42-44
Comments on "Multi-Core" Security
..............page:5-7
Website ID Card——Server Certificate
..............page:28,30
Brief Information
..............page:41,44,47
Design of Self-Test Software for Simulation Platform of Certain Weapon System
zhang hui ; zhang yuan ; huo jian hua
..............page:51-53
Study on TCP Option Optimization Based on Long Fat Network
huang chen bo ; wu yong ; zhang jian dong
..............page:66-67,70
Typical Methods and Examples of Stream Cipher Analysis
chen yi yang ; chen gong liang
..............page:87-89,92
Typical Methods and Examples of Stream Cipher Analysis
chen yi yang ; chen gong liang
..............page:87-89,92
Design of Connector for High-speed Data Transmission
zhao yi
..............page:90-92
Design of Connector for High-speed Data Transmission
zhao yi
..............page:90-92
Multi-domain Policy Conflicts and Detection Methods Based on RBAC
gu he wu ; pan li
..............page:84-86
Multi-domain Policy Conflicts and Detection Methods Based on RBAC
gu he wu ; pan li
..............page:84-86
ID-based Proxy Digital Signature
he yuan yu
..............page:74-76,81
Semptian Tech Putting out MCP
..............page:38
Semptian Tech Putting out MCP
..............page:38
ID-based Proxy Digital Signature
he yuan yu
..............page:74-76,81