Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2012 Issue 2
2012 nian shi da xin xi an quan re dian yu ce
jin jin
..............page:11-12
Application of Distributed Video Coding Based on LDPCA
yi li xin ; liu yun li ; yuan cheng gang ; chen chuan jiang
..............page:42-44,47
yi dong zhi zuo an quan qi ye dang kuai su xing dong
bai jie
..............page:21-22,27
Analysis and Study of Defense against Security Risk for Industry Control System
wang wen yu ; liu yu hong
..............page:33-35
OmniSep: Data Isolation for Cloud Services
yang yong ; wang qiang
..............page:57-59,66
Study on e-mail Identification based on Multiple Attributes
nie xiao chen ; qiu wei dong ; li yan ; shi shao pei
..............page:76-77,80
2011 xin xi an quan shui shi da ying xiong xia
zhou xue
..............page:13-16
ye jie jing ying xin chun ji yu
..............page:20-20
Study on Instant Message Monitoring of Fetion
tang long ; liu zhong lin ; liu jia yong
..............page:39-41
On Cloud Computing and Its Security
wu tao
..............page:63-66
A Trusted Computing-based Platform Signature Scheme of Mobile Terminal
xie ying zuo ; zheng dong
..............page:73-75
zhuan jia zuo yan
..............page:6-6
A Behavior Feature-Monitoring Model based on Knowledge Base
tang xiao lan ; liu zhong lin ; liu jia yong
..............page:51-53,56
jin tian ni de mi ma xie lou liao ma
wang he ming
..............page:28-28
zhan zai ju ren de jian shang
mu zuo
..............page:1-1
A Trusted Computing Platform and Trust Chain Transfer Validation Method
liu yi ; mao jun jie
..............page:45-47
zhong guo xin xi an quan biao zhun hua qing kuang jie shao
yang jian jun
..............page:26-27
ye jie dong tai
wu
..............page:3-4
Study on Characters of Typical Over-wall Software
guan guo jing
..............page:67-68,72
Study on IoT Security
liu ping ; liu xiao dong
..............page:69-72
jia na da shang yong liang zi ji suan ji dui mi ma xue de ying xiang
wang chao ; zhang huan guo
..............page:31-32,35
Accelerating Elliptic Curve Point Multiplication Using Alternative Scalar
wang yue ; qiu wei dong
..............page:78-80
Study on Digital Watermarking Technique based on Wavelet Transform
wang yan ; li xiu zuo
..............page:48-50
Technology and Application of GMB Algorithm Security SoC
xu shu min ; liu jian wei ; tian xin ; luo shi xin
..............page:36-38