Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2013 Issue 6
Discussions and Experiences in Security Technology Inspection in Classified Information System
LI Yuan-feng
..............
page:74-76
Study on Sinamicroblog Data Acquisition Technology
HUANG Yan-wei;LIU Jia-yong
..............
page:71-73,76
zhu meng xia yi dai hu lian wang an quan
..............
page:36-37
A Hierarchical-centralized Network Security Architecture Effectively Preventing APT Attacks
XU Ting
..............
page:65-67
an quan bei hou de li liang
..............
page:1
Reply to Two Papers Analyzing REESSE1+ Problems
SU Sheng-hui;LV Shu-wang
..............
page:46-47,52
shan shi wang ke da zao he nan sheng jiao yu kao shi zhong xin an quan
..............
page:45
wang luo cheng xin gou jian yi po zai mei jie
..............
page:28
lun xin xi xi tong an quan si hua jian she
zhang zuo
..............
page:27
di pu ke ji fa bu xin yi dai yun ji ye wu he xin ping tai
..............
page:42
Influence Assessment on Microblog Users
MA Xiao-juan;LI Yu-zhen;HU Yong
..............
page:53-55
wu lian wang yu xin xi an quan
fan yuan
..............
page:24
ids tan zhen rang an quan geng jia quan mian che di
..............
page:38
ji shu geng yun yan shen an quan chan ye jiang jie
..............
page:7-17
xing neng yu an quan , que yi bu ke
..............
page:39-40
ge wu zhi zhi wu lian wang
..............
page:18-21,23
Cipher Resource Distribution Technology based on Short Message Channels of Beidou System
WENG Huai-rong;XU Ke-zhi;PAN Yu
..............
page:68-70
Trusted Computing Platform for Virtualization Technology
CAI Yi;ZUO Xiao-dong
..............
page:77-79
Classified Projects Tracking Management for Colleges and Universities
HAN Zhi-bin;CHEN Jiu-ming;LIU Huan;JIA Yan
..............
page:59-61
jin shan si you yun deng chang bo zhuo apt cheng zui da kan dian
..............
page:41
OTP-based SET Improvement and Mobile Payment Application
TAN Jian-feng
..............
page:80-83
wu lian wang ji shu ji qi xin xi an quan fang hu
nie yuan ming
..............
page:22-23
ip hua men jin xi tong cu jin yi liao xing ye mai xiang zhi neng guan li
..............
page:43-44
xin xi dong tai
..............
page:2-6
Social Network: Anonimous Friend-Making based on Common Interests
WEI Wen-jia
..............
page:84-86
shui dong liao wo men de xiao tian dian
..............
page:29-30
Campus Information Construction and Management Work
SUN Zhi;ZHAO Hong-qiang;ZHANG Yu-xiao
..............
page:56-58
Security Audit Service in Cloud Computing
ZHANG Jian;CHEN Jian-feng;WANG Qiang
..............
page:62-64,67
xiao xin , bu yao bei ni de wu xian lu you qi chu mai
..............
page:25-26
Global Information Grid Black Core Encryption Technology
JIN Gang;CHEN Qian
..............
page:48-52