Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2012 Issue 10
Application of IPsec Security Strategy
zhao jin long ; ding jian ; huang xing ; long hui
..............page:102-104
Improved Method for Web Crawler-based Cross-site Detection
xi ren na ya sen ; fang yong ; zhang qian
..............page:55-58
On Emergency Response of Computer Room Infrastructure
shen xue mei ; cao yi
..............page:84-85,88
wu an quan bu wifi
wang he ming
..............page:37-38
2012-2013 hui yi qiang xian bao
..............page:7-7
Integrity Authorization of PDF Documents based on Digital Watermarking
zhi ce ; ma zhao feng ; jiang ming ; niu xin xin ; yang yi xian
..............page:63-66
mei you xiao yan de zhan zheng
liu zuo
..............page:15-16
yi tu he wei amd jiang jia bian luan jia
bei zuo
..............page:50-50
Application of Digital Watermarking in Digital Label Technology
cai fei fei ; xu qiang
..............page:69-71
fei du wu rao mei bi yao !
yan wei chuan
..............page:51-51,52
Parallel Image Processing Implementation under Hadoop Cloud Platform
zhang liang jiang ; huan fei ; wang yang de
..............page:59-62
yi dong zhong duan e yi dai ma guan lian he zhui zong
pan xuan chen
..............page:21-22
ROP Attack and Defense Technology based on ARM
qian yi ; wang zuo jun ; xue zhi
..............page:75-77
Analysis on Malware's Hidden Information Detection based onVM's vmem File
he xiang ; zhou an min ; pu wei ; zhou zuo
..............page:67-68,71
Server Logining Control based on Key Sharing Management System
zheng zhi yong ; zhu zheng zhi
..............page:96-97
an quan wei shi jie
..............page:3-4
Research and Implementation of Squid System based on Linux
li li ; yang ke ; zhao lei
..............page:72-74
yi dong zhi neng zhong duan ying yong ruan jian an quan jian ce
yuan chun yang
..............page:17-17,22
Security Strategy based on WiMAX System
xu xiao tao ; rong xiao ge ; chen zuo
..............page:81-83
New Methods for Statistical Analysis of Stream Ciphers
li heng ; li rui lin ; xie duan qiang
..............page:78-80,83
Study on Security of Internet Banking System
zeng shu ; wu hai sheng
..............page:91-93