Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2012 Issue 1
A Distributed Onion Routing Scheme based on Group Signature
ye gang ; xue zhi
..............page:91-93
di 6 jie nei wang an quan ji shu lun tan long zhong zhao kai
zhou xue ; bai jie ; hu xiao he
..............page:14-15
Risk Assessment for Integration Project
yang quan
..............page:109-110
A Security Improvement based on Tor Router Algorithm Optimization
huang wen jie ; shi yong ; xue zhi
..............page:94-96
Design on In-vehicle Voice Communication System based on VoIP
wang jia dong
..............page:72-73
zhong duan zhun ru kong zhi ji shu tan tao
zhao jie
..............page:48-48,50
mi ma ren zheng yu xin ren bao zhang
jing ji wu
..............page:18-19
Research on Security of WPA/WPA2 Protocol
bai ; wang zuo jun ; xue zhi
..............page:106-108
Study on Flaws Investigation and Privilege Escalation of Oracle
zhao li han ; xue zhi ; wang zuo jun
..............page:97-99
Study on Security Risk Assessment of Military Information System
liang xiao yan ; yu zuo
..............page:100-102
nei wang ying yong an quan ji dian kao lv
wang hui bo
..............page:45-46
mi ma xue jie zhuan ti wang qi hui gu
..............page:31-31
2011 xin xi an quan shui shi da ying xiong shang
zhou xue
..............page:20-27
A Social Network Security Ontology Model Incorporating Information Flow
liu yi yang ; zhang bao wen
..............page:64-66
Tunnel Optimization based on Traditional Anonymous Network
yan yi ; shi yong ; xue zhi
..............page:89-90,93
Layered Research of Business Continuity based on Ontology
gong wei ; zhang bao wen
..............page:74-75,79
guo chan shou ji xin xi wang yu qi dian xiao mi
jun jun ; xuan ben jie
..............page:43-44
dian nao xin xi an quan bao hu san sha xiang
wang he ming
..............page:37-39
Research on Security of Ajax Applications
xuan yi guang
..............page:80-83
jing zhun fang hu bian jie jian hua guan li mu biao
zhong jun yi
..............page:51-51
qian xi dong tai kou ling ji shu zai wu lian wang de ying yong
lu zhou ; yu hua zhang ; peng fei
..............page:59-60
Research on Trojan Horse Hiding and Residence Technology According to Ghost Restoration
zheng cheng ; wang zuo jun ; xue zhi
..............page:84-86
Recryption Technology of A Fully Homomorphic Encryption over Integers
tang dian hua ; zhu shi xiong ; cao yun fei
..............page:76-79
On the Values of PLA Confidentiality Culture Study
ju nai zuo ; wang heng huan ; tian hua li ; ou shi jin
..............page:87-88,93
ToT-based Solution to Energy-consumption Monitoring System
xun jiu ; yu hai ; fang li guo
..............page:67-69,71
Study on IP Tracing Technologies against DoS Attact
wang nai wei ; zheng hui ying
..............page:103-105
jia qiang fang hu cuo shi gei li wang yin an quan
hu xiao he
..............page:2-5
hua yu xin xi an quan zong he jie jue fang an
zhang he
..............page:47-47
web an quan lao yi shang neng huo fou
jiang yuan
..............page:33-36
Exploration on Optical Fiber Wiretapping and Intrusion Detection
chen zuo ; zhu shi xiong
..............page:61-63
ye jie dong tai
..............page:6-7
yun ji suan an quan yu deng ji bao hu
shen chang xiang
..............page:16-17
tong xin ji shu zheng gao qi shi
..............page:96-96