Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2013 Issue 8
Research on the Network Performance Management Based on APM
LONG Yao-hua;NIU Zuo-yuan
..............
page:68-69,72
The Construction of a PKI Application Security Supportive Platform
YU Jian
..............
page:60-62
rang ai ji yuan li liu mang ruan jian
..............
page:25-26,28
Development Trend of Telecom Services under Full-service Operation
WANG Yun-bing;YIN Sheng;HU Zhao-hua
..............
page:48-51
check point: wang luo an quan jiu shi cai fu
..............
page:37
dian xin he hu lian wang yong hu ge ren xin xi bao hu gui ding
..............
page:2-3
Study on Sensitive Data Vault Management of Telecom Industry
CHANG Run-mei;MENG Li-qing
..............
page:82-84
tian rong xin rong an quan da hui yin bao wei lai shi chang xin re dian
..............
page:35
h3c yu f5 gong tui fen bu shi shu ju zhong xin jie jue fang an
..............
page:40
dian xin he hu lian wang yong hu ge ren xin xi bao hu gui ding jie du
..............
page:3-4
Practical Control on Sensitive Data Propagation of Cloud Computing
WANG Zhi-wen;WANG Qiang
..............
page:85-87
jie mi na xie jing bu qi tui qiao de an quan gong neng
..............
page:20-21
Flooding-Attack Defense based on Campus Network Flow Detection
ZHANG Ping;ZHENG Jin;CHEN Xiao-jun
..............
page:80-81
san dian ding wei bao lu she jiao an quan
..............
page:27-28
shu ju zhong xin xu ni hua huan jing de an quan tiao zhan
wang yue hong
..............
page:22-23
xin xi dong tai
..............
page:5-9
Design of Digital-Encryption Radio based on dPMR Standard
LV Guo-dong;DAI Xian-ju;SONG Tao
..............
page:65-67
qu shi ke ji deep security9.0 zheng shi fa bu
..............
page:36
Data Storage Security Test Method for Mobile Intelligent Terminal System
TANG Jie;LU Quan-fang;WEN Hong
..............
page:76-79
wang luo an quan huo mian lin xin yi lun geng xin huan dai ?
..............
page:10-15
Date Centre and Virtualization Technology
TANG Wei;DENG Xuan
..............
page:56-59
Policy Integrity Security Mechanism for Network System
GONG Min-bin;PAN Li;QIAN Hong
..............
page:73-75
qu shi ke ji zhu li zhang ye shi gong an ju xu ni hua an quan
..............
page:41
wang yu xing yun fa bu td3000 xi lie ru qin jian ce xi tong
..............
page:36
luo mu ? huo shi duo mu chang jing de kai qi
..............
page:1
VoIP Technology based on Combined Public Key
CHEN Nan-yang;LIAO Rong-hui
..............
page:63-64
From GMIC Viewing the Mobile Internet Security
ZHANG Ya-nian;ZHANG De-zhi;HE En
..............
page:42-44
shi xin xi zhong xin wang luo she ji fang an
..............
page:39,40
Simulation Test Planning and Design of Service-Oriented Architecture
TIAN Hui;ZHANG Dai
..............
page:52-55
qian xi sa ban si fa an yu xin xi an quan shen ji
zuo you zuo
..............
page:24
Research and implementation of network monitoring tool Cacti Based on Linux
LI Li;LUO Han-jie
..............
page:45-47
an quan reng zai pao ma yi dong hu lian wang ban tu chu ding
..............
page:16-19
Key Management Technology Suitable for Ethernet
LAI Tao;YAN Liang;GUO Qing
..............
page:88-90
Study on SRTP and Key Exchange for IPTV System
LIU Jun
..............
page:70-72
yun ying ji nat ji shu li zhu kuan dai cheng yu wang jian she
..............
page:38