Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2012 Issue 6
Ideal Functionality and Sequential Composition of Zero-knowledge
wang zhu ; dai yi qi
..............
page:84-86
yi dong hu lian wang shi dai de gou tong bian ge
li xiao guang
..............
page:35-35,37
Technology of Secure U Disk on Special Network and Application Management
hao guang zuo
..............
page:50-52
Security Design and Implementation of Electric Power Dispatching Data Network
wang xiao ying
..............
page:76-77,80
Study of Security Mechanism based on Hadoop
ma zuo
..............
page:89-92
xin xing shi xia ru he bao zhang fu wu qi shu ju an quan
jin jin
..............
page:23-26
Analysis on Chinese Semantic Orientation Identification of Network Topic-oriented Comment Text
liu zuo ; hu yong
..............
page:73-75
fang fa jue ding cheng xiao ru he zuo hao ji tuan xin xi an quan bao zhang gong zuo
xiao xin hua ; li dong
..............
page:21-22
hui yi qiang xian bao
..............
page:5-6
di 22 jie quan guo xin xi bao mi xue shu hui yi zheng wen tong zhi
..............
page:93-93
ye jie dong tai
..............
page:7-8
waf xuan li xu guan zhu wu da gong neng
lv ming
..............
page:44-44
Research on Desktop Virtualization and Its Security
sun yu ; chen zuo xin
..............
page:87-88,92
Identification of Online Forum Opinion Leaders based on Influence Formation Mode
he zuo ; hu yong ; wu yue
..............
page:81-83
Study of Worm-Attack Detection based on Netflow
zhao li ; li chao yang
..............
page:53-55
guo chan shou ji jiang ying lai qian yuan mian fei shi dai
jun jun
..............
page:36-37
Research on Detection of Vulnerability-Exploiting Technology Heap Spray
liu lei ; wang zuo jun ; xue zhi
..............
page:70-72
shi nian mo jiu chuang xin jian fang bei jing gong ye da xue ji suan ji xue yuan mi ma xue zhuan jia su sheng hui jiao shou
hu xiao he
..............
page:27-29
Pickle Vulnerability Exploitation and Defense
he zuo zuo ; zhou an min ; fang yong ; liu liang
..............
page:67-69
sai men tie ke zhong xiao qi ye jie jue fang an ri quan guo xun zhan huo re qi dong
..............
page:94-94
Windows Security Mechanisms of Heap and Exploitation Possibility
zhou yu peng ; fang yong ; zhou zuo ; pu wei
..............
page:65-66,69
tong xin ji shu zheng gao qi shi
..............
page:93-93
check point si kuan xin pin qi yu an quan wei xie
gu shan
..............
page:43-43
xin xi an quan shang shi gong si nian bao da jie mi
bai jie
..............
page:12-19
Comprehensive Experiment Design of VPN based on Virtual Machines
yang hao zuo ; cheng hong rong ; zhang wen ke
..............
page:56-58
xin xi an quan yu tong xin bao mi za zhi qi yong ke ji qi kan xue shu bu duan wen xian jian ce xi tong
..............
page:75-75
Analysis on GSM System Optimization
lu wei yan ; zhou xing cai
..............
page:59-61,64
xin xing shi xia ru he ying dui xin tiao zhan zhua zhu xin ji yu
..............
page:3-4
wen jia bao zong li zhu chi zhao kai guo wu yuan chang wu hui yi yan jiu bu shu tui jin xin xi hua fa zhan bao zhang xin xi an quan gong zuo
..............
page:2-2
wei shi shang zao ! chao ji ben cai gang shang lu
yan wei chuan
..............
page:38-42
zhong guo mi ma xue hui 2012 nian hui zheng wen tong zhi
..............
page:94-94
ni gai xuan ze shi me yang de shu ju ku an quan shen ji chan pin
cheng yun peng
..............
page:45-46,48
tian rong xin ceo yu hai bo tan xin xi an quan xin xing shi
hu xiao he
..............
page:30-31
jie du wu jiu tui jin zheng ce
pan zhu ting
..............
page:9-11
yi dong hu lian wang an quan sheng yan xia de si kao
wang he ming
..............
page:33-34
cong ye ji fen xi tan mi shi chang qu shi
..............
page:20-20,22
xin xi an gong xing ji shu guo jia gong cheng yan jiu zhong xin jian jie
..............
page:49-49
cong shang shi kan xin xi an quan xing ye de fa zhan zhi lu
..............
page:1-1
shou jie hai nan sheng xin xi hua fa zhan da hui zuo chan pin zhan shi hui long zhong zhao kai
..............
page:58-58
Design of VPN Manager Server based on F2812
zhang ming chao
..............
page:78-80
yi dong yun ji shu zai zhi zao qi ye de ying yue
cheng yun peng
..............
page:47-48
an quan xin yin huan jing ti sou suo yin qing cheng du liu
zhou xue
..............
page:32-32
2011 nian du zhong guo qi ye yuan gong xin xi an quan yi shi diao cha bao gao fa bu
..............
page:6-6
Algebraic Immunity and Algebraic Degree of Correlation- immunity H Boolean Function
huang jing lian ; wang zhuo
..............
page:62-64