Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2013 Issue 1
ji yu b/s jia gou web ying yong an quan fang fan
hu dong mei
..............
page:31
li xing kan cu xiao wu rang dian shang bian dian shang
..............
page:24-28
Risk assessment Approach Based on Data Fusion Technology and HMMs Model
GAO Fei;YANG Shan;XIAO Zhi-hua
..............
page:70-74
you yun chu gu zai bing cheng zhong guo yun gu yin zhi wei zhu ren fang tan lu
..............
page:13-14
Study on Chaotic Block Cipher based on Feistel Structure
ZHENG Hao;LIN Mo-yun
..............
page:63-64,67
wei lai wu ke yu zhi , wei lai ke yi chuang zao
..............
page:6
Implementation of Affine Cipher
WANG Ru-tao;SHI Yi-shan;WANG Xiao-jun;ZHAO Jin-long
..............
page:75-77
jie de swp nfc jie jue fang an tui dong yi dong zhi fu da gui mo shang yong
..............
page:32
Application of SVN in Enterprise Documents Management
LIU Yu-liang;JIANG Xiao-feng
..............
page:46-48
mu biao shi zhong ru yi , chang qi jian chi bu xie xin xi an quan yu tong xin bao mi za zhi she 2013 nian bian wei zhuan jia ken tan hui ji shi
..............
page:7
tou shi hai wai kuo zhang de an quan zhang ai
..............
page:1
Study on Android Rootkit based on VFS
ZHU Wei;WANG Yi-jun;XUE Zhi
..............
page:68-69,74
A Cloud Architecture-based Enterprise Information Leak Prevention Method
YANG Lei;SONG Ying-li
..............
page:78-80
A Relationship-based Importance Algorithm for Micro-blog Network System
QIU Jun;LIU Gong-shen
..............
page:51-53
check point jie du 2013 nian an quan
..............
page:23
ming chao wan da : pan dian 2012 nian shi da xin xi xie mi shi jian
..............
page:22
hd8000m amd zhong yu kao pu liao
..............
page:29
An Internet Public Opinion Index Algorithm based on Hierarchical Index System
ZHANG Pei-fan;LIU Gong-shen
..............
page:57-59
Simulation Realization for TopDisc Routing Protocol in OMNet ++ Environment
WANG Zang-jing;LI Hong-xia
..............
page:54-56,59
jie pu xin xi an quan yi ti hua ji zhong guan li xi tong (jsoc)
..............
page:33-34
zhen wang gong ji yu wang luo zhen zhu gang de ke neng xing
..............
page:8-10
A New Identification Scheme for IPv6 based on Bit Stream
WANG Yang-de;QIU Wei-dong;ZHANG Liang-jiang
..............
page:65-67
xin xi dong tai
..............
page:2-5,53
A Credit Evaluation System for Cyberspace Individual Users of BBS
XU Xin-hong;ZHANG Bao-wen;KONG Ling-yu;KONG Guo-dong
..............
page:60-62
ca technologies fa bu 2013 nian wu da it qu shi yu ce
..............
page:19
Building-up and Application of Testbench based on Verilog
LIU Xing-jiang;WANG Hui
..............
page:43-45
Study on Viewpoint Extraction of Chinese Mircoblog
WANG Zheng-xiao;HUANG Zheng
..............
page:49-50,53
bao li yun an quan luo hu zhong guo yun gu
..............
page:30
jia qiang wang luo huan jing zhi li , gai shan wang luo xin xi bao hu
..............
page:11-12
Power Allocation over Two Identical Gilbert-Elliott Channels with Penalty
JIANG Wei;TANG Jun-hua
..............
page:40-42,45
mi ma ying yong yu nei wang fa zhan de xiang fu xiang cheng zhi dao zhuan fang shang hai jiao tong da xue chen ke fei jiao shou
..............
page:15-18
Study on Single-Cycle T-Function Sequences and M-Sequences
QIAO Tong-xu;ZHU Shi-xiong;WANG Yun-bing;SHEN Bing
..............
page:36-39
yu yun ji shu ling hang yun an quan
..............
page:34
shu zi zheng shu er san shi
..............
page:20-21