Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2013 Issue 4
A Log Security Policy based on Local Database
GENG Zhen-min;YANG Hong;YANG Hai-bing
..............page:109-112
zhuo mian xu ni hua min zu qi ye zhi zuo qi
he qin lin
..............page:42-43
Tracking Management of Classified Projects for Colleges and Universities
LIU Huan;CHEN Jiu-ming;JIA Yan;HAN Zhi-bin
..............page:106-108
Basic Authentication Phishing Attack and Preventive Technology
XU Cheng-wen;FANG Yong
..............page:95-96,99
Vulnerability Mining System based on Program Process Tracing Technology
ZHANG Yuan;FANG Yong
..............page:90-91,94
Study on Vulnerabilities Mining based on Program Flow Control
LI Yun-guo;LI Jia-jie;XU Jia-pin
..............page:86-89
Web Real-Time Communication System based on OpenID Security Authentication
QIN Xiao-na;HAO Ping;HE En
..............page:70-72,75
An Information Security Monitoring System based on Proxy
LUO Yan-hua
..............page:73-75
xin xi dong tai
..............page:4-15,80
Solution for Integrated Emergency Communication System
LIU ru-mei;YANG Bo;TANG Guang-liang
..............page:64-66
Fingerprint Characteristics Protection based on Fuzzy Vault Method
CHEN Yun-chuan;LIU Jia-yong
..............page:92-94
A K-Anonymity Algorithm based on Dividing and Sorting
LI Ying-tao;MA Chun-guang;YANG Wen-wen
..............page:76-80
wu lian wang an quan na xie shi er
..............page:32-33
Analysis on GIG Information Assurance Status of U.S.Military
CAI Yi;CUI Yong
..............page:97-99
Design of Downloading App Applications based on Silicon's CPU
GUO Gang;WANG Xiao-ji;LI Jun-sheng
..............page:67-69
Browser's Privacy Information Storage and Protective Technology
LU Yong-qiang;FANG Yong;FANG Fang;FU Wei
..............page:84-85
Microblog Information Collection and Processing Techniques base on JDBC
ZHANG Yin;LIU Jia-yong
..............page:62-63,66
Analysis on WPA/WPA2 Protocol Security
SUN Quan-fu;Senbai Dalabaev;LI Qing-hua
..............page:81-83
check point 2013 an quan bao gao
..............page:49-56
Study on Security Technology for Browser Cross-Domain Communication
HE Liang;FANG Yong;FANG Fang;PU Wei
..............page:59-61
Analysis of Security Routing Protocols for Space-based Synthesis Information Network
XU Ke-zhi;PAN Yu;DENG Yun;XU Meng-ming
..............page:100-101,105
Survey of Authentication Protocol
XU Meng-ming;XIAO Cong;JIANG Wei;FU Yi
..............page:57-58,61
Formal Verification of Secure Communication in Wireless Sensor Networks
ZHU Wei-long;CHEN Chuan-feng
..............page:102-105