Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2011 Issue 5
Content Security in Cloud-computing Devices
WANG Wei-hong
..............page:17
Safety Problems of Cloud Computing
ZHANG Qiu-jiang;WANG Peng
..............page:94-95
What Kind of Secure Mail We Need Today
LI Wei
..............page:21
Tactical Internet-oriented Battlefield Information Transport Control Technology
YANG Yang;YANG Zhen;LONG Yi-xiang
..............page:74-75,79
Research of RSVP Extensions based on FMIPv6
WU Hai;TIAN Bo
..............page:59-61
Adaptive Algorithm for Anomaly Detection based on Kalman Filter
WANG Han-zhi;FAN Lei
..............page:67-69
Study on Document Transmission Characteristics of MSN and Its Recovery
ZHOU Xiao-liang;LIU Jia-yong
..............page:62-63,66
Study on WinRAR Key Recovery based on Reverse Engineering
WANG Xing-nan;CHEN Xiao-hong;SHIShao-pei;JIN Ling
..............page:82-85
IEEE 802.lls Network and Its Performance Evaluation
YAO Yan-wei;WU Yue;JIANG Wei
..............page:70-73
Analysis and Supervision of P2P Network Resource Diffusion Model
CHEN Han;SHI Yong;XUE Zhi
..............page:56-58
Solution for Whole Life-circle Data Security
WANG Wen-yu
..............page:20
xin xi dong tai
..............page:2-6,61,66,73
New-generation Stronghold Host
PAN Yu-xun
..............page:45
Baidu Fell into "Tear-open Gate"
..............page:27-29
Design and Implementation of Web Application Firewall
WANG Yu;LU Song-nian
..............page:104-106
Design on Wideband CIC Amendment Function
CHEN Jian-min;YAO Yuan-cheng;CAI Xiao-li
..............page:64-66
Study on Honeypot Detection Technology
SHEN Ming;XUE Zhi;WANG Yi-jun
..............page:91-93
Attack Graph Generation based on Security Administrator Information
SHI Hao;WANG Yi-jun;XUE Zhi
..............page:88-90
Virus of Smartphone and Information Security
ZHU Sheng-jun;LIU Gong-shen;LUO Jun;TAO Chun-he
..............page:96-97,100
Construct High Performance Text Clustering Systems based on Map-Reduce
ZENG Jing-jing;LI Xiang;LIN Xiang
..............page:98-100
Study on Virtual Machine Security Isolation based on Intel VT-d
LIN Kun;HUANG Zheng
..............page:101-103
Practice and Self-examination on Infosec Service
WU Min-hua
..............page:15-16
Degeneracy——A Bio-inspired Technology in Wireless Communication Network
ZHANG Zi-yang;TANG Jun-hua;LI Jian-hua
..............page:80-81,85
an quan shou ji jiang yin ling wei lai
..............page:30-32
Design and Implementation of ECC Digital Signature System
ZHANG Yan-li;LIU Jia-yong
..............page:86-87,90
Dynamic Call to Honeypot Script based on Rule
ZHOU Jian-le;XUE Zhi;WANG Yi-jun
..............page:110-112
Thought on Online Banking Security Construction based on PB Document 19
LI Zheng;LIU Bao-cheng
..............page:49-55,58