Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2012 Issue 7
yun ti xi jia gou kao wen cao zuo xi tong an quan
hu xiao he
..............page:32-35,41
jing ti gao kao hou de wang luo xian zuo
gu shan
..............page:51-51
an quan wei shi jie
bai jie
..............page:6-6
Realization of Orthogonal Frequency Division Multiplexing based on DSP
zeng jiu zhen ; wang chao ; wang yan
..............page:84-86
xia yi dai an quan fang hu de zhan lue si kao
zhao liang
..............page:20-21
ying dui apt shi yi chang chi jiu zhan
zou wei
..............page:15-15
apt fa zhan qu shi yan jiu man tan
li qing shan
..............page:16-16,21
apt gong fang
fang xing
..............page:22-22
A Safe Digital Video Watermarking Algorithm
zhou wang ; fang yong ; pu wei ; zhou zuo
..............page:111-112,116
File System Monitor based on Virtualization Technology
peng hua ; zhou an min ; liu liang ; zuo zheng
..............page:108-110
Study on Intrusion Detection Experiment System Supporting Large scale and Concurrent Control
feng guo jun ; xiong dong qing ; wu hong jie ; li jia chun
..............page:74-76
Analysis and Improvement of EAP-TLS Protocol
chen yu jiao ; zhuang yue qian
..............page:106-107,110
Research and Implementation of Multi-threading Data Acquisition in Linux
wu yu jia ; pu wei ; zhou zuo ; liu jia yong
..............page:92-94
web an quan de quan sheng ming zhou qi
bai jie
..............page:59-61
A RFID-based U-disk Encryption Method
an xi wen ; qi ning
..............page:101-102,105
hui wang chang xiang 5 nian lu
jiang yuan
..............page:56-56
bao wei ying pan ke bu rong huan
yan wei chuan
..............page:47-47
An IP Address Configuration Scheme in Mobile Communication Network
li hai tao ; long zuo xiang ; meng fan xin
..............page:95-96,100
Design and Implementation of File Backup Integrity Assurance Management System
geng zhen min ; zeng shu
..............page:123-125
Implementation of Quick Debug Method in UEFI Computer System
gao yun ling ; yang guo dong ; guo yuan xing
..............page:97-100
Discussion on Intranet Security Problem and Management
peng ling
..............page:120-122,125
A Computer Security System based on Dynamic Hybrid Honeypot Technology
huang yan ; fang yong ; jiang lei ; liu liang
..............page:129-131
Safety Risk and Control of Government Online Trading System
wang jian bing
..............page:126-128,131
Network-based APT Attack and Defense Strategies
chen jian feng ; wang qiang ; wu zuo
..............page:24-27
Cube Cryptanalysis of Block Cipher CTC
mu dao guang ; zhang wen zheng
..............page:132-135
Exploration on Building-up Dynamic Infosec Assurance System
zhang zuo ; zhao cheng dong
..............page:81-83
QAuth: A Lightweight Framework for Cross Domain Access based on SOA
zuo lu sheng ; wang qiang
..............page:136-138
A Provably Secure Threshold Signature Scheme Under Standard Model
qiao dan dan ; liu zhen hua ; wang bao cang ; liu xue
..............page:117-119
checkpoint xie zhu cio da zhan jiang shi wang luo
li ruo zuo
..............page:68-68
Study on Encryption Technology in Internet of Thin,gs
zhao wen ; wu chuan wei ; luo min
..............page:103-105
da shu ju yu apt gong ji jian ce
zhou tao
..............page:23-23
tong xin ji shu zheng gao qi shi
..............page:76-76
trinity ye bai he ye you cun tian
bei zuo
..............page:69-70
2012 hui yi qiang xian bao
..............page:4-5
Study on Policy-based Network Management in Tactical Network
long zuo xiang ; li hai tao ; hu zuo
..............page:87-89
ivybridge ying zhi biao ruan si lu
bei zuo
..............page:52-52
zhong guo san da yun ying shang an quan zhi dao
gu shan
..............page:42-44
jie xi xia yi dai fang huo qiang xia yi dai wang guan
wang he ming
..............page:57-58
hu lian wang shou ji lu zai he fang
zuo zuo
..............page:65-67
An Information System Security Solution based on Security Engi]aeering Life-cycle
zhang du le ; zhu huai jie ; he zuo ; chen he jun
..............page:113-116
yi dong zhi fu ji yu yu feng xian bing cun
jun jun
..............page:49-50