Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2013 Issue 8
Research on the Network Performance Management Based on APM
LONG Yao-hua;NIU Zuo-yuan
..............page:68-69,72
rang ai ji yuan li liu mang ruan jian
..............page:25-26,28
Development Trend of Telecom Services under Full-service Operation
WANG Yun-bing;YIN Sheng;HU Zhao-hua
..............page:48-51
Study on Sensitive Data Vault Management of Telecom Industry
CHANG Run-mei;MENG Li-qing
..............page:82-84
Practical Control on Sensitive Data Propagation of Cloud Computing
WANG Zhi-wen;WANG Qiang
..............page:85-87
Flooding-Attack Defense based on Campus Network Flow Detection
ZHANG Ping;ZHENG Jin;CHEN Xiao-jun
..............page:80-81
shu ju zhong xin xu ni hua huan jing de an quan tiao zhan
wang yue hong
..............page:22-23
xin xi dong tai
..............page:5-9
Design of Digital-Encryption Radio based on dPMR Standard
LV Guo-dong;DAI Xian-ju;SONG Tao
..............page:65-67
Data Storage Security Test Method for Mobile Intelligent Terminal System
TANG Jie;LU Quan-fang;WEN Hong
..............page:76-79
Date Centre and Virtualization Technology
TANG Wei;DENG Xuan
..............page:56-59
Policy Integrity Security Mechanism for Network System
GONG Min-bin;PAN Li;QIAN Hong
..............page:73-75
VoIP Technology based on Combined Public Key
CHEN Nan-yang;LIAO Rong-hui
..............page:63-64
From GMIC Viewing the Mobile Internet Security
ZHANG Ya-nian;ZHANG De-zhi;HE En
..............page:42-44
Simulation Test Planning and Design of Service-Oriented Architecture
TIAN Hui;ZHANG Dai
..............page:52-55
qian xi sa ban si fa an yu xin xi an quan shen ji
zuo you zuo
..............page:24
Key Management Technology Suitable for Ethernet
LAI Tao;YAN Liang;GUO Qing
..............page:88-90
Study on SRTP and Key Exchange for IPTV System
LIU Jun
..............page:70-72