Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2011 Issue 8
vision solutions da li kuo zhan quan qiu he zuo huo ban she qu
jin jin
..............
page:18-18
hai guan zong shu chinasec yi dong zhong duan an quan jie ru fang an
yao jun
..............
page:23-23,25
ji yu yun ji suan de shu ju bao hu zhan lue jiang cheng qu shi
..............
page:21-21
di fang cai zheng guo ku zhi fu wu zhi hua an quan jia gu fang an
li zuo yang
..............
page:24-25
Security Policy for Tree Square Kilometers Digital Campus
wang yong ; zhou xin ; zhang long ; guo zhi bo
..............
page:47-49
tian jin gao xiao cheng li shou jia bao mi xue yuan
..............
page:40-40
ni guang nan yuan shi tan wu lian wang fa zhan qu shi
hu xiao he
..............
page:5-5
Visualization of Network Security Situation based on Parallel Coordinates
yao zuo ; xuan lei
..............
page:67-71
Position and Role of Procuratorial Technology in Procuratorial Information
han jun jie
..............
page:62-63,66
it huan jing de an quan fu za xing diao yan bao gao chu lu
..............
page:20-20
he xin chuang tian yu da zao it qu dao 4s dian
..............
page:19-20
qi ye xu yao wei yu chou zuo de san da ke ji qu shi
jiang yuan
..............
page:17-17
Automatic Min-sound Direction-finding based on Wavelet Transform
liu su ; quan hou de ; wang bo zuo
..............
page:30-31,34
Module Design of Remote Monitoring for Motor Excitation Parameters
zhang xiao qing
..............
page:35-37
tian jin guo jia xin xi an quan chan ye ji di cheng guo jia huo ju ji hua te se chan ye ji di
..............
page:25-25
ye jie dong tai
..............
page:2-4
2011 ying te er - qing hua quan guo da xue sheng chuang xin chuang ye shi jian xia ling ying luo mu
..............
page:71-71
Formal Analysis of Non-Repudiation Protocol based on Colored Petri Net Model
su gui ping ; sun sha
..............
page:54-55,58
meng hu zhan che wang yu min yong ji jia gu fang huo qiang
..............
page:29-29
she mi xin xi xi tong zhong de ying yong fu wu an quan fang hu jie jue fang an
cheng yun peng
..............
page:26-28
tong xin ji shu zheng gao qi shi
..............
page:37-37
Study on Integrated Management and Control Technology Confidential File
wang wen yu ; liu yu hong
..............
page:72-74,76
BP Network and Its Application in Multi-factor Time Series Prediction in College Confidential Project
han zhi bing ; li yan ; wu jie jun ; kou xiao dong
..............
page:32-34
xin xi an quan yu tong xin bao mi za zhi qi yong ke ji qi kan xue shu bu duan wen xian jian ce xi tong
..............
page:61-61
RFID Anti-collision Algorithm of Frequency-Hopping CDMA
wei dong mei ; huang jing wu ; zou chuan yun
..............
page:41-43
mai ke fei tui chu quan xin yi dong an quan jie jue fang an
..............
page:29-29
Extending Algorithm of RSA Algorithm
zhang yan zhao
..............
page:75-76
Design and Implementation of Secure Online Study and Examination System
liu dan
..............
page:64-66
Study and Practice of SSE-CMM
he fang
..............
page:59-61
ling ren ai hen jiao jia de android
yan wei chuan
..............
page:15-16
Security Analysis of Decoy-State Quantum Key Distribution System
chen zuo ; huang yi sheng ; liu yi ming
..............
page:56-58
Security Analysis of Multi-antenna Broadcast Channel Model based on Block Diagnolization Precoding
lv shi chao ; wen hong ; han zuo dai
..............
page:50-53
guo ji wang luo an quan bao hu lian meng lun dun cheng li
..............
page:43-43
mo wang an quan , rang ban gong geng jia wan mei
bai jie
..............
page:12-14
zhang huan guo jiao shou tan kang liang zi ji suan mi ma de yan jiu yu fa zhan
jin jin
..............
page:8-11
lv meng ke ji fa bu qu dao zhan lue ji hua
..............
page:22-22
net optics rong huo fose zui jia jiang
..............
page:22-22
xin xi an quan ji chu bu jian guo chan hua xi lie zhuan ti zhi wu ru he bao wei zhong guo zhan shi jie si fen zhi yi de xu ni guo tu fang zhong guo rui da xi tong zhuang bei gong si gao ji gong cheng shi yang jiu yan
hu xiao he
..............
page:6-7
Study on Generic Electronic Record Storage and Evidence Retrieval System
long yi hong ; luo sheng ; tang zhi hong ; liu xu
..............
page:44-46,49
Design & Realization of Communication Between FPGA & Embedded Processor
zhong hong ; liu di jun
..............
page:38-40
tian ping de liang duan hu lian wang de zi you yu an quan
..............
page:1-1