Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2011 Issue 3
Design and Implementation of Campus Information Portal Website Group
CHENG Luo-de;WANG Chuan-jun;XING Xu-feng
..............
page:39-40,43
Special Topics Series on Homemade Infosec Basic Components Part 1:Homemade——God Disposes or Man Proposes
..............
page:8-11
General Survey of 2011 Charge-free Virus-killing Softwares
..............
page:34-35
Color Mage Segmentation Algorithm based on Space Extrema and Region Merging
GAO Kui;CAI Li-ming;LU Song-nian
..............
page:36-38
Prediction on 2011 10Top Hotspots in Information Security
..............
page:7
Study on Evaluation of Key Management Scheme in Wireless Sensor Network
CUI Xiao-chen;ZHANG Chuan-rong;ZHANG Qiang
..............
page:64-66
The Elimination of Integer-period Ranging Timescale Slidingby Using Frame Head and Reducing Jitter Clock
DANG Oun;YAO Tong;ZHANG Bing-jun
..............
page:47-48,51
Study on Pre-distortion Technique Based on Polynomial and Look-up Table
CHEN Bin;REN Guo-chun;GONG Yu-ping
..............
page:44-46
Intel Promoting Mobile Computing Development with Completely New Technolgy
..............
page:27-28
Analysis on 8B/10B Code in High-Speed Transmission
LI Yu-wei;PAN Ming-hai
..............
page:41-43
The New Development Pattern of China Infosec Market in 2011
..............
page:12-13
An Image Encryption Algorithm based on Perturbing High-dimension Chaotic Maps
REN Shuai;GAO Cheng-shi;DAI Qing
..............
page:67-69,73
Study on E-document Security Audit and Confidentiality Technology
WANG Fei
..............
page:73-74,78
Information Security and Confidentiality Analysis of Campus Network
LI Han;WEI Hai-yan;PAN Wei
..............
page:75-78
McAfee and RSA Develops Technical Cooperation Jointly
..............
page:28
Giving Upward Wings to the Dream——General Manager XU Li\'s Talk on 30Kaitian\'s 8-year Development Course
..............
page:22-24
The Improvement of AODV based on Mobility
PAN Xin;ZENG Hao-yang;CHEN li
..............
page:49-51
Perfect the Emergency Management Assure the Sustainability of Financial Services
LEI Tao
..............
page:32-33
Surfilter\'s Terminal Security Solution for Military Industry
..............
page:30-31
The Smart Mobile-phone Facing Security Threats
..............
page:14-15
QoS Improvement of Video Conference System by RSVP Protocol
WU Hai
..............
page:52-54
Study and Design of FFT Algorithm in OFDM System
YAO Xing-bo;YANG Yong-xia
..............
page:58-60
2010 China Information Security Check: The Protection of Key IT Assets Becomes the Focus
..............
page:21
Advantages Analysis on Jump\'s Network Information Audit System
CHENG Yun-peng
..............
page:29,31
Generous in Serving the Country with the Loyal Heart——Reminiscences of Mr.LI Xuejun
..............
page:1
A Discussion on Network War
GAO Feng
..............
page:18-19
Inspur\'s SSR Supporting Guangzhou Asia-game——Kernel-level Defense for Infosec Assurance
..............
page:20
xin xi dong tai
..............
page:2-6,19,20,38,54,78
Watch out for the Virus of Black-hat Search Engine
..............
page:16-17
WatchGuard\'s Talk on 2011 Development Trend
..............
page:26
Development of the Honeypot System with Fingerprint Database Scalability
ZHU Si-qi;WANG Yi-Jun;XUE Zhi
..............
page:70-72
Ruckus Puts out the Completely Intelligent Mobile Wi-Fi Solution
..............
page:25
Construction of LDPC Code based on Permutation Matrices Optimization
XUE Dong-liang;LI Xiang-xue;ZHENG Dong
..............
page:55-57,60
Study on Data Extraction in the Process of oracle-11g-based Web SQL Injection
BAO Cheng-yi;WANG Yi-jun
..............
page:61-63