Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2011 Issue 8
Security Policy for Tree Square Kilometers Digital Campus
wang yong ; zhou xin ; zhang long ; guo zhi bo
..............page:47-49
qi ye xu yao wei yu chou zuo de san da ke ji qu shi
jiang yuan
..............page:17-17
Automatic Min-sound Direction-finding based on Wavelet Transform
liu su ; quan hou de ; wang bo zuo
..............page:30-31,34
ye jie dong tai
..............page:2-4
Formal Analysis of Non-Repudiation Protocol based on Colored Petri Net Model
su gui ping ; sun sha
..............page:54-55,58
tong xin ji shu zheng gao qi shi
..............page:37-37
Study on Integrated Management and Control Technology Confidential File
wang wen yu ; liu yu hong
..............page:72-74,76
BP Network and Its Application in Multi-factor Time Series Prediction in College Confidential Project
han zhi bing ; li yan ; wu jie jun ; kou xiao dong
..............page:32-34
RFID Anti-collision Algorithm of Frequency-Hopping CDMA
wei dong mei ; huang jing wu ; zou chuan yun
..............page:41-43
Extending Algorithm of RSA Algorithm
zhang yan zhao
..............page:75-76
Study and Practice of SSE-CMM
he fang
..............page:59-61
ling ren ai hen jiao jia de android
yan wei chuan
..............page:15-16
Security Analysis of Decoy-State Quantum Key Distribution System
chen zuo ; huang yi sheng ; liu yi ming
..............page:56-58
mo wang an quan , rang ban gong geng jia wan mei
bai jie
..............page:12-14
net optics rong huo fose zui jia jiang
..............page:22-22
Study on Generic Electronic Record Storage and Evidence Retrieval System
long yi hong ; luo sheng ; tang zhi hong ; liu xu
..............page:44-46,49
Design & Realization of Communication Between FPGA & Embedded Processor
zhong hong ; liu di jun
..............page:38-40