Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2013 Issue 7
wei lai zhi lu : wang luo an quan neng li zhong gou xu qiu zuo ruo gan si lu
du yue jin
..............
page:14-15,17
Discussion on the Smart Grid Information Security
JIANG Jin;SUN Zhong-wei
..............
page:75-76
Evaluation of Infosec Management System
GUO Xi-quan
..............
page:50-52
an quan fu wu jin ru tuo guan mo shi
..............
page:18-19,21
Data-Execution Prevention Technology in Windows System
GAO Ying-chun;ZHOU An-min;LIU Liang
..............
page:77-79,82
an quan zai wang luo zuo zhu mian qian zhi shi kong tan
..............
page:1
Application Practice of Flow Analysis and Control Strategy in Campus Network
SUN Zhi;XU Liang;LIANG Jin
..............
page:55-57
Vulnerability Analysis based on IE Memory Corruption and Defense Strategy
DUAN Ming-juan;ZHOU An-min;LIU Liang
..............
page:80-82
yun ji suan huan jing xia de an quan ying yong
jiang hao
..............
page:44
wang shen sni deng bao ying yong an li
..............
page:41
yi zhu li xi tong wang luo an quan jie jue fang an
..............
page:42
leng jing men kao wen qi ye ru he shou zhu shu ju an quan di xian
..............
page:43
wang yu xing yun qi ming xing chen gong tui xia yi dai an quan wang guan chan pin
..............
page:36
mei fa bu ti gao guan jian ji chu she shi wang luo an quan yi yu he wei ?
..............
page:27-31
Study on Command-and-Control System Development for Cyberspace Blue Force
KE Hong-fa;XIA Bin;DU Hong-mei;LI Yun-tao;TANG Yue-pin
..............
page:45-47
Security of FPGA-based Design
SU Xian-hai;XIANG Hong-quan;JIN Dong-fang
..............
page:72-74
men jin xi tong de fa zhan yu wei lai ying yong qu shi
..............
page:39-40
wu lian wang an quan de yan jiu zhe zhuan fang zhong guo ke xue yuan xin xi gong cheng yan jiu suo wu chuan kun yan jiu yuan
..............
page:11-13
Cryptograph Synchronization Technology in Real-time Wireless Image Secure Communication
LONG Xing-gang;YU He-zhou
..............
page:86-88
A NFC Anonymous Authentication based on ECC
NIE Yun-yun;ZHOU An-min;LIU Liang
..............
page:69-71
wang sheng ke ji tui chu an quan guan li you jian xi tong okmail
..............
page:37
xin xi dong tai
..............
page:2-7
leng jing zhe she xin xi an quan zhu duo yin huan
..............
page:8-10,13
ca fa bu 2013 nian zhong guo he zuo huo ban ji hua
..............
page:38
A Design of Food Information Monitoring System based on IoT Technology
LI Ang;LI Lei;XIAO Fu
..............
page:53-54,57
Secure Coding based on BCH for Unconditional Secure Communications
WU Jian-lang;ZOU Guang-nan;Shi Yun;PAN Fei;WU Yi-fan;WEN Hong
..............
page:58-60
False Data Injection Attack based on Probability Statistics
LI Le;HONG Shuang-jun;ZHANG Chi
..............
page:61-64,68
fang huo qiang shi xian san ji tiao , jin ru zhi neng shi dai
..............
page:25-26
qian hu wan huan shi chu lai : xia yi dai fang huo qiang zhuan fang wang kang ke ji gao ji shi chang jing li yan lei
..............
page:33-35
wu kong bu ru de li xian gong ji
..............
page:20-21
Enlightenment and Exploration of Big Data
CHEN Hui;DENG Yun
..............
page:48-49,52
wu lian wang xin luo jiao dian : zhi neng gu gan wu liu wang
..............
page:16-17
Application of PCI-E Interface on Network Communication Platform based on FPGA
YU Hai;YANG Xian-wei;REN Ji-kui
..............
page:83-85
shu ju ku an quan yi cheng wei wang luo an quan de he xin
..............
page:23-24
A Forward Secure Key Management Protocol Based on IBE
HUANG Jin-tao;ZHOU Xiao;ZHANG Jian-chuan;DENG Lei-sheng
..............
page:65-68
hua wei qi ye ye wu jian chi bei ji cheng
..............
page:32,35
shu ju jia mi shi chang zai qi hang
..............
page:22