Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2012 Issue 4
dian zi shang wu an quan yu icp ju jin
yan wei chuan
..............page:39-40
2012 hui yi qiang xian bao
..............page:4-5
Implementation of Identity-Address Separation Technology in IP Network
li jian ; wang bang li
..............page:67-69
tong xin ji shu zheng gao qi shi
wu
..............page:95-95
zhi shi an quan yi ge dian xing de kong jian yan jiu
kevin c.desouza; li chang hong yi zhe
..............page:35-36,38
cpk zu he gong yue ti zhi v7 0
nan xiang hao
..............page:49-50,55
Study on Trusted Route Protocol-THWMP in Wireless Mesh Networks
li pei ; wu yue
..............page:93-95
rsa da hui xin xi an quan jie de bu lao chuan shuo
hu xiao he ; bai jie ; zhou xue
..............page:9-13
wang luo yun ying jian kong li qi soc xi tong
liu ya xuan
..............page:41-42
An Architecture for Secure Cloud Computing
wang qiang ; chen jian feng ; wang jian feng
..............page:99-101
A New Trust Management Model for P2P Network
li jia lun ; yang da
..............page:96-98
wo zai yun duan an quan qi ye tan yun ji suan
bai jie
..............page:16-23
Application of Multiple Random Sequence in Arithmetic Coding
zhou ming ; feng min fu
..............page:102-104
Thinking on Measures for Maintenance of Army EM Space Security
guo biao ; tang da rong ; cheng long
..............page:73-75
Research on Semantic Orientation of Forum Replies based on Structure
lu bin ; liu gong shen ; guo jie
..............page:76-78
dao ban an quan wu fa guan bi de hou men
yan wei chuan
..............page:33-34
zhong duan an quan nei wang an quan shu ju an quan wei lai shui shi zhu liu
hu xiao he ; wang he ming
..............page:24-30
Study on Technology and Management of Information Security in Electronic Commerce
guo da liang ; fan qing fen
..............page:70-72,75
yun shi dai shen fen shi bie jiang huan xin zhuang
zhou xue
..............page:31-32
Cross-layer Security Framework for Tactical Mobile Ad hoc Network
zeng meng zuo ; pu wen bin ; mu yang ; chen ai hua
..............page:51-55
Design of Trusted Office Automation System
peng zhan ; li mi
..............page:61-63,66
Confidence Level-based Attack Graph Analysis
zhou shu yang ; chen ya jun
..............page:90-92
Formal Security Verification of Virtual Environment in Cloud Computing
chen jian feng ; wang qiang ; wang jian feng
..............page:64-66
Study on EMR System based on Cloud Storage and Access Control Policy
zhou kai ; jiang xing hao ; sun zuo feng
..............page:86-89
Heat Distribution of Hot Network Emergency
jiao chao ; liu gong shen
..............page:58-60
Cloud Computing and Oil Industry
wang zheng sheng ; pan li na ; li xiao li ; lv fang fang
..............page:56-57
Vulnerability and Attack of Routing Protocol in IEEE 802.11s
du shang zuo ; yi ping ; luo qing hua
..............page:79-81,85