Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2011 Issue 3
Design and Implementation of Campus Information Portal Website Group
CHENG Luo-de;WANG Chuan-jun;XING Xu-feng
..............page:39-40,43
Color Mage Segmentation Algorithm based on Space Extrema and Region Merging
GAO Kui;CAI Li-ming;LU Song-nian
..............page:36-38
Study on Evaluation of Key Management Scheme in Wireless Sensor Network
CUI Xiao-chen;ZHANG Chuan-rong;ZHANG Qiang
..............page:64-66
Study on Pre-distortion Technique Based on Polynomial and Look-up Table
CHEN Bin;REN Guo-chun;GONG Yu-ping
..............page:44-46
Analysis on 8B/10B Code in High-Speed Transmission
LI Yu-wei;PAN Ming-hai
..............page:41-43
An Image Encryption Algorithm based on Perturbing High-dimension Chaotic Maps
REN Shuai;GAO Cheng-shi;DAI Qing
..............page:67-69,73
Information Security and Confidentiality Analysis of Campus Network
LI Han;WEI Hai-yan;PAN Wei
..............page:75-78
The Improvement of AODV based on Mobility
PAN Xin;ZENG Hao-yang;CHEN li
..............page:49-51
Study and Design of FFT Algorithm in OFDM System
YAO Xing-bo;YANG Yong-xia
..............page:58-60
Advantages Analysis on Jump\'s Network Information Audit System
CHENG Yun-peng
..............page:29,31
A Discussion on Network War
GAO Feng
..............page:18-19
xin xi dong tai
..............page:2-6,19,20,38,54,78
Development of the Honeypot System with Fingerprint Database Scalability
ZHU Si-qi;WANG Yi-Jun;XUE Zhi
..............page:70-72
Construction of LDPC Code based on Permutation Matrices Optimization
XUE Dong-liang;LI Xiang-xue;ZHENG Dong
..............page:55-57,60
Study on Data Extraction in the Process of oracle-11g-based Web SQL Injection
BAO Cheng-yi;WANG Yi-jun
..............page:61-63