Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2012 Issue 5
ge ren xin xi bao hu guo jia biao zhun bian zhi wan cheng
..............
page:3-3
Boolean Functions Constructed by Concatenate Construction Method
dong xin feng ; song yun fen ; zhang wen zheng
..............
page:81-83
zhi neng shou ji xing neng yu an quan yi ge bu neng shao
jun jun
..............
page:33-35
Security of Internet Banking based on Cost/Efficiency Analysis
ban xiao fang ; zuo zuo
..............
page:51-54
quan mian an quan de wang luo jie jue fang an
..............
page:49-50
zhong guo mi ma xue hui 2012 nian hui zheng wen tong zhi
..............
page:50-50
ivy bridge xiang zhuang wu jian yi zai pei gong
..............
page:45-45
di wu jie zhong guo shu ju zhong xin da hui zai jing ju xing
..............
page:8-8
bei xin yuan lian xu 6 nian ling pao zhong duan an quan shi chang
..............
page:7-7
check point yu ce 2012 nian jiu da an quan qu shi
..............
page:47-48
guo min ji shu jiang kai fa xin yi dai ke xin ji suan jie jue fang an
..............
page:46-46
jiao tu ke ji fa bu an quan yun jie jue fang an
..............
page:8-8
A Research of Video Encryption Technology Based on H.264/SVC
li min ; guo jie
..............
page:94-96
Study on Security Technology of Cloud Computing Virtualization
yi tao
..............
page:63-65
Image Contour Extraction Algorithm based on Color and Line Segment Detection
xia ; guan hai bing ; huan fei
..............
page:58-60,65
ultrabook nan tao shang wang ben mo zhou
bei zuo
..............
page:36-36
Analysis on SSL-Webmail Monitoring based on Man-in-the-Middle Technology
ou yang jiang ; li ; liu jia yong
..............
page:69-71
zu he gong yue cpk ji shu de chuang xin shi jian
zhao jian guo
..............
page:55-57
yu shi dai lai xi
hu xiao he
..............
page:23-25
Study on State-based Remote Detection Technology for SQL Injection Vulnerability
li chang shun ; hu yong
..............
page:72-74
an quan xin pian zuo qiang chan ye lian cai you di qi
ji yu
..............
page:28-30
zheng jiu yin si , bu zuo tou ming ren shou bu ge ren xin xi bao hu guo jia biao zhun bian zhi wan cheng
wang he ming
..............
page:31-32
wo zai yun duan an quan qi ye tan yun ji suan xu
bai jie
..............
page:12-21
2012 hui yi qiang xian bao
..............
page:4-5
bei jing zhi dao chuang yu fa bu 2011-2012 zhong guo hu lian wang wang zhan an quan bao gao
..............
page:6-6
2012 nian tong xin wang luo an quan fang hu jian cha gong zuo hui yi zhao kai
..............
page:3-3
Study and Analysis Signatures of Advanced Persistent Threat
huang da li ; xue zhi
..............
page:87-89
Research and Implementation of Risk Assessment for Commercial Bank Information Technology
mao nan ; yao pei nian ; cao yu lei ; ding hui
..............
page:66-68,71
jie de zhu wo da feng shi xian an quan yun fu wu
..............
page:8-8
ye jie dong tai wo guo ban fa shou pi xin xi xi tong an quan ji cheng fu wu zi zhi ren zheng zheng shu
..............
page:6-6
hai tai fang yuan chan pin zhong biao hua xia yin xing
..............
page:6-6
guo jia yu ming an quan lian meng cheng li
..............
page:8-8
xin xi an quan yu tong xin bao mi za zhi qi yong ke ji qi kan xue shu bu duan wen xian jian ce xi tong
..............
page:36-36
A Role Mapping Mechanism for RBAC-Based Multi-Domains
zhou zuo ; pan li
..............
page:78-80,83
blue coat fa bu an quan bao gao
..............
page:7-7
hu huan zhong guo xiang yun
..............
page:1-1
2012 xin xi an quan lun tan he ke ji zhan zai jing ju xing
..............
page:8-8
di 22 jie quan guo xin xi bao mi xue shu hui yi zheng wen tong zhi
..............
page:54-54
Firewall Policy Conflict Detection and Conflict Rules Visualization
sun li qin ; pan li
..............
page:75-77,83
hid global ju ban men jin ji shu jiao liu hui
..............
page:38-38
22nm you duo qiang han intel ivy bridge quan mian ping ce
yan wei chuan
..............
page:39-44
wei shi tong zhang xian guo jia dui shi li zai xiang jiao liu yun an quan jia gou
..............
page:7-7
2011 nian sha du ruan jian xing ye xin wen chuan bo fen xi bao gao
fang kun
..............
page:37-38
quan guo xin xi an quan biao zhun wei yuan hui zhao kai 2011 nian hui ji biao zhang xian jin ge ren
..............
page:7-7
An Improved Image Secret Sharing Scheme
wang xiao long ; chen ya jun
..............
page:90-93
zhong duan an quan nei wang an quan shu ju an quan wei lai shui shi zhu liu
jin zuo zuo
..............
page:26-27
chen ke fei zong he kao liang cheng wei xian you mi ma zhu yao tiao zhan
zhou xue
..............
page:9-11
qian tan waf shi chang zhong chang jian de jian ce ji shu
..............
page:48-48
Research on Underwater Acoustic Channel Adaptive Equalization Algorithm
wu yue ; li jun ; di jun wei
..............
page:61-62,65
qi ye yan zhong de mi ma xue yu mi ma ying yong hou liang zi mi ma gong yue suan fa yan jiu you wei po qie fang cheng du wei shi tong xin xi chan ye gu fen you xian gong si fu zong gong cheng shi yu qin yong
jin jin
..............
page:22-22,25
Research on the Technology of Cloud Infrastructure
zhang zhi ming ; wang qiang
..............
page:84-86
gong an bu ji zhong da ji qin hai gong min ge ren xin xi fan zui
..............
page:2-2
tong xin ji shu zheng gao qi shi
..............
page:74-74
dong ruan neteye long zhong tui chu duo kuan xin pin
..............
page:6-6