Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2012 Issue 5
Boolean Functions Constructed by Concatenate Construction Method
dong xin feng ; song yun fen ; zhang wen zheng
..............page:81-83
Security of Internet Banking based on Cost/Efficiency Analysis
ban xiao fang ; zuo zuo
..............page:51-54
A Research of Video Encryption Technology Based on H.264/SVC
li min ; guo jie
..............page:94-96
Image Contour Extraction Algorithm based on Color and Line Segment Detection
xia ; guan hai bing ; huan fei
..............page:58-60,65
ultrabook nan tao shang wang ben mo zhou
bei zuo
..............page:36-36
Analysis on SSL-Webmail Monitoring based on Man-in-the-Middle Technology
ou yang jiang ; li ; liu jia yong
..............page:69-71
zu he gong yue cpk ji shu de chuang xin shi jian
zhao jian guo
..............page:55-57
yu shi dai lai xi
hu xiao he
..............page:23-25
wo zai yun duan an quan qi ye tan yun ji suan xu
bai jie
..............page:12-21
2012 hui yi qiang xian bao
..............page:4-5
Study and Analysis Signatures of Advanced Persistent Threat
huang da li ; xue zhi
..............page:87-89
Research and Implementation of Risk Assessment for Commercial Bank Information Technology
mao nan ; yao pei nian ; cao yu lei ; ding hui
..............page:66-68,71
A Role Mapping Mechanism for RBAC-Based Multi-Domains
zhou zuo ; pan li
..............page:78-80,83
blue coat fa bu an quan bao gao
..............page:7-7
hu huan zhong guo xiang yun
..............page:1-1
Firewall Policy Conflict Detection and Conflict Rules Visualization
sun li qin ; pan li
..............page:75-77,83
22nm you duo qiang han intel ivy bridge quan mian ping ce
yan wei chuan
..............page:39-44
An Improved Image Secret Sharing Scheme
wang xiao long ; chen ya jun
..............page:90-93
Research on Underwater Acoustic Channel Adaptive Equalization Algorithm
wu yue ; li jun ; di jun wei
..............page:61-62,65
Research on the Technology of Cloud Infrastructure
zhang zhi ming ; wang qiang
..............page:84-86
tong xin ji shu zheng gao qi shi
..............page:74-74