Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2012 Issue 6
Ideal Functionality and Sequential Composition of Zero-knowledge
wang zhu ; dai yi qi
..............page:84-86
yi dong hu lian wang shi dai de gou tong bian ge
li xiao guang
..............page:35-35,37
Study of Security Mechanism based on Hadoop
ma zuo
..............page:89-92
hui yi qiang xian bao
..............page:5-6
ye jie dong tai
..............page:7-8
waf xuan li xu guan zhu wu da gong neng
lv ming
..............page:44-44
Research on Desktop Virtualization and Its Security
sun yu ; chen zuo xin
..............page:87-88,92
Study of Worm-Attack Detection based on Netflow
zhao li ; li chao yang
..............page:53-55
Research on Detection of Vulnerability-Exploiting Technology Heap Spray
liu lei ; wang zuo jun ; xue zhi
..............page:70-72
Pickle Vulnerability Exploitation and Defense
he zuo zuo ; zhou an min ; fang yong ; liu liang
..............page:67-69
Windows Security Mechanisms of Heap and Exploitation Possibility
zhou yu peng ; fang yong ; zhou zuo ; pu wei
..............page:65-66,69
tong xin ji shu zheng gao qi shi
..............page:93-93
check point si kuan xin pin qi yu an quan wei xie
gu shan
..............page:43-43
Comprehensive Experiment Design of VPN based on Virtual Machines
yang hao zuo ; cheng hong rong ; zhang wen ke
..............page:56-58
Analysis on GSM System Optimization
lu wei yan ; zhou xing cai
..............page:59-61,64
wei shi shang zao ! chao ji ben cai gang shang lu
yan wei chuan
..............page:38-42
ni gai xuan ze shi me yang de shu ju ku an quan shen ji chan pin
cheng yun peng
..............page:45-46,48
jie du wu jiu tui jin zheng ce
pan zhu ting
..............page:9-11
yi dong hu lian wang an quan sheng yan xia de si kao
wang he ming
..............page:33-34
cong ye ji fen xi tan mi shi chang qu shi
..............page:20-20,22
Design of VPN Manager Server based on F2812
zhang ming chao
..............page:78-80
yi dong yun ji shu zai zhi zao qi ye de ying yue
cheng yun peng
..............page:47-48