Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2012 Issue 4
dian zi shang wu an quan yu icp ju jin
yan wei chuan
..............
page:39-40
it chan pin xin xi an quan ren zheng guan jian ji shu yan jiu ke ti qi dong
..............
page:7-7
kan liang hui ji ji tui jin xin xi an quan huan jing de jian she
..............
page:1-1
2012 nian rsa da hui jing cai shun jian ji jin
..............
page:8-8
2012 hui yi qiang xian bao
..............
page:4-5
sai men tie ke o3 wei yun ji suan ti gong quan xin an quan kong zhi
..............
page:6-6
liang hui dai biao wei xin xi an quan jian yan xian ce
..............
page:2-3
Implementation of Identity-Address Separation Technology in IP Network
li jian ; wang bang li
..............
page:67-69
bei yue qian shu zui da sai bo fang yu he tong
..............
page:69-69
jie de wei ying te er ti gong ke xin fu wu guan li
..............
page:7-7
tong xin ji shu zheng gao qi shi
wu
..............
page:95-95
xin xi an quan xin jiao dian gong ye kong zhi xi tong an quan
zhang zuo
..............
page:46-48
zhi shi an quan yi ge dian xing de kong jian yan jiu
kevin c.desouza; li chang hong yi zhe
..............
page:35-36,38
cpk zu he gong yue ti zhi v7 0
nan xiang hao
..............
page:49-50,55
Study on Trusted Route Protocol-THWMP in Wireless Mesh Networks
li pei ; wu yue
..............
page:93-95
rsa da hui xin xi an quan jie de bu lao chuan shuo
hu xiao he ; bai jie ; zhou xue
..............
page:9-13
wang luo yun ying jian kong li qi soc xi tong
liu ya xuan
..............
page:41-42
An Architecture for Secure Cloud Computing
wang qiang ; chen jian feng ; wang jian feng
..............
page:99-101
wang yu xing yun kingguard xing ye ying yong dian xing an li jing cui
..............
page:43-44
2012 zhong guo ge ren xin xi bao hu da hui zhao kai
..............
page:78-78
A New Trust Management Model for P2P Network
li jia lun ; yang da
..............
page:96-98
wo zai yun duan an quan qi ye tan yun ji suan
bai jie
..............
page:16-23
Application of Multiple Random Sequence in Arithmetic Coding
zhou ming ; feng min fu
..............
page:102-104
An Optimized Cross-layer Scheduling Scheme based on Physical Layer Security
zhao yi meng ; wu yue
..............
page:82-85
Thinking on Measures for Maintenance of Army EM Space Security
guo biao ; tang da rong ; cheng long
..............
page:73-75
ruckus xie zhu da zao xi bu zui da xiao yuan wu xian wang
..............
page:7-7
Research on Semantic Orientation of Forum Replies based on Structure
lu bin ; liu gong shen ; guo jie
..............
page:76-78
dao ban an quan wu fa guan bi de hou men
yan wei chuan
..............
page:33-34
zhong duan an quan nei wang an quan shu ju an quan wei lai shui shi zhu liu
hu xiao he ; wang he ming
..............
page:24-30
2011 nian hu lian wang wang luo an quan tai shi bao gao fa bu
..............
page:6-6
wu yun kun qi ye yao gan yu zou chu guo men xun zhao dui shou
..............
page:15-15
Study on Technology and Management of Information Security in Electronic Commerce
guo da liang ; fan qing fen
..............
page:70-72,75
yun shi dai shen fen shi bie jiang huan xin zhuang
zhou xue
..............
page:31-32
ri ben ji hua jian li fang yu xi tong an quan zhong xin
..............
page:85-85
wei bo dao hao an xiang jia v xin xi an quan xing shi yi ran yan jun
wang he ming
..............
page:37-38
Cross-layer Security Framework for Tactical Mobile Ad hoc Network
zeng meng zuo ; pu wen bin ; mu yang ; chen ai hua
..............
page:51-55
xin xi an quan yu tong xin bao mi za zhi qi yong ke ji qi kan xue shu bu duan wen xian jian ce xi tong
wu
..............
page:60-60
Design of Trusted Office Automation System
peng zhan ; li mi
..............
page:61-63,66
Confidence Level-based Attack Graph Analysis
zhou shu yang ; chen ya jun
..............
page:90-92
Formal Security Verification of Virtual Environment in Cloud Computing
chen jian feng ; wang qiang ; wang jian feng
..............
page:64-66
hid global men jin jie jue fang an bao zhang nan chang chang bei ji chang hang zhan lou de an quan
..............
page:7-7
Study on EMR System based on Cloud Storage and Access Control Policy
zhou kai ; jiang xing hao ; sun zuo feng
..............
page:86-89
wei shi tong qian tou tui jin yun ji suan an quan xiang guan gong zuo
..............
page:7-7
you jin ka ba si ji hu yu cheng li guo ji wang luo an quan zu zhi
..............
page:6-6
Heat Distribution of Hot Network Emergency
jiao chao ; liu gong shen
..............
page:58-60
Cloud Computing and Oil Industry
wang zheng sheng ; pan li na ; li xiao li ; lv fang fang
..............
page:56-57
zhong guo mi ma xue hui 2012 nian hui zheng wen tong zhi
wu
..............
page:42-42
Vulnerability and Attack of Routing Protocol in IEEE 802.11s
du shang zuo ; yi ping ; luo qing hua
..............
page:79-81,85
duan wei heng bao zhuo gong ying de xin tai qie xing qie xue xi
..............
page:14-14
di 22 jie quan guo xin xi bao mi xue shu hui yi zheng wen tong zhi
wu
..............
page:92-92
an shi ling xin zhu li he bei yi shu xue yuan wlan wang luo jian she
..............
page:45-45
mei guo guo fang bu jia kuai yan fa xin yi dai de wang luo wu qi
..............
page:6-6
wei shi tong gong si rong huo cheng du gao xin qu 2011 nian du duo xiang shu rong
..............
page:6-6