Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2011 Issue 2
Social Communication Network: A Frequently-happened Place of Privacy Divulgence
..............
page:20-21
Design and Implementation of TPM-based Cluster Trusted System
LIU An-zhan;ZHANG Wen-ning
..............
page:46-48
Anti-Network-Threat War Would Re-display a Stormy and Unstable Situation in 2011
..............
page:25
Network Security Problem Faced by Three-network Integration and Its Solutions
ZHAI Sheng-jun
..............
page:22
Founder Computer Constructed End-to-End Security Solution of Government Office Business
..............
page:27-28
Application Resisting Threats Security Creating Services(Part 2)——the 1st International Infosec Conference Held in Tianjin in 2010
..............
page:15-17
Payment Process of Mobile Wallet
LI Wen-jin
..............
page:52-54
Detection of Trojan Covert Communication based on Client Honeypot
ZHANG Chen;WANG Yi-jun;XUE Zhi
..............
page:49-51
Establishment and Development of LAAS in America
WANG Hong-feng;YANG Wei-bin
..............
page:32-34
Management System Construction and Design for Procuratorial organ
LIANG Hai-tang;HU Xu-qian
..............
page:43-45
Inspur Infosec Escorted World Expo 2010
..............
page:28
A Business Sort Method based On Genetic Algorithm
XU Dun;ZHANG Bao-wen
..............
page:41-42,45
A Network Risk Evaluation Model based on Privilege Escalation Graph
YAO Xiao-qi;ZHANG Bao-wen
..............
page:71-73
Analysis and Solution of Web Application Loopholes
YANG Lin;YANG Peng;LI Chang-qi
..............
page:58-60,63
2010\'s Ten Events Affecting US Government Information Security
HU Min
..............
page:30-31
Who would be the Legend in 2011 Infosec Industry(Part 2)
..............
page:5-9
xin xi dong tai
..............
page:2-4
Suppression of EMI Caused by Piston Engine Spark in UAV Telecontrol Receiver*
DANG Qun;DUAN Peng;FENG Jin-chao
..............
page:38-40
Study on Circumvention of Virtual Machine Anti-Virus
JIANG Xiao-feng;SHI Yong;XUE Zhi
..............
page:55-57
Infosec\'s Four Fundamental Operations
..............
page:1
Jiaoda Jump\'s Server Defense System——Server Security Guardian
CHEN Xiao-bing
..............
page:29
Military Equipments Management Information System based on RFID
WANG Jun-ji;WANG Xin-zheng;WANG song;ZHONG Liang
..............
page:64-66
A Tracking Loop in Low SNR Condition
SU Zheng-kai;LIN Jing-ran;PENG Qi-cong
..............
page:35-37
Directly Facing On-line Purchase Security Threats
..............
page:18-19
Privacy Ontology-based Personalized Access Control Model
QIAN Ji-an;JIANG Xing-hao;SUN Tan-feng
..............
page:67-70,73
Database in Demand of Specific Security Audit and Evaluation——An Interview with Prof.LUO Ping from Software School of Qinghua University
..............
page:12-14
Botnet Indulging in Wanton Persecution Globally
..............
page:23
Guangzhou AsiaGame First Started Using Terminal-access Control Products form Venustech
..............
page:26
Selection of Trusted Factor in Software Trusted Measurement
YI Tao
..............
page:61-63
Trust Evaluation based on Cloud Model for C2C e-commerce
LI Zheng-tao;HAN Fang
..............
page:74-76
Innovative Opportunity in Personalized Internet Times
..............
page:24
How to Assure Private Information Security at the Year End and the Year Beginning
..............
page:10-11