Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2011 Issue 2
Design and Implementation of TPM-based Cluster Trusted System
LIU An-zhan;ZHANG Wen-ning
..............page:46-48
Payment Process of Mobile Wallet
LI Wen-jin
..............page:52-54
Detection of Trojan Covert Communication based on Client Honeypot
ZHANG Chen;WANG Yi-jun;XUE Zhi
..............page:49-51
Establishment and Development of LAAS in America
WANG Hong-feng;YANG Wei-bin
..............page:32-34
Management System Construction and Design for Procuratorial organ
LIANG Hai-tang;HU Xu-qian
..............page:43-45
A Business Sort Method based On Genetic Algorithm
XU Dun;ZHANG Bao-wen
..............page:41-42,45
A Network Risk Evaluation Model based on Privilege Escalation Graph
YAO Xiao-qi;ZHANG Bao-wen
..............page:71-73
Analysis and Solution of Web Application Loopholes
YANG Lin;YANG Peng;LI Chang-qi
..............page:58-60,63
xin xi dong tai
..............page:2-4
Suppression of EMI Caused by Piston Engine Spark in UAV Telecontrol Receiver*
DANG Qun;DUAN Peng;FENG Jin-chao
..............page:38-40
Study on Circumvention of Virtual Machine Anti-Virus
JIANG Xiao-feng;SHI Yong;XUE Zhi
..............page:55-57
Military Equipments Management Information System based on RFID
WANG Jun-ji;WANG Xin-zheng;WANG song;ZHONG Liang
..............page:64-66
A Tracking Loop in Low SNR Condition
SU Zheng-kai;LIN Jing-ran;PENG Qi-cong
..............page:35-37
Privacy Ontology-based Personalized Access Control Model
QIAN Ji-an;JIANG Xing-hao;SUN Tan-feng
..............page:67-70,73
Trust Evaluation based on Cloud Model for C2C e-commerce
LI Zheng-tao;HAN Fang
..............page:74-76