Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2014 Issue 2
di er shi ge chun tian de duan xiang
qing zuo ;
..............
page:6-7
gong xin bu fu bu chang yang xue shan : zhua zhu zhong da ji yu shi xian you da bian qiang
..............
page:10
xin xi dong tai
..............
page:11-17,112,封3
zi zhu ke kong shi shi xian an quan de bi you zhi lu
shang zuo ;, yang zhan ;
..............
page:18-21
jia kuai ji shu chuang xin ying dui cao zuo xi tong an quan feng xian
wang shi ;, zuo xiao dong ;
..............
page:22-25
fa zhan ji yu zhong guo wen zi de xin xi ji shu chan ye
hu yue jun ;, yi li ;
..............
page:26-27
wang luo chu li qi rang guo chan ying jian ying qi lai
dong jian feng ;, li li ;, wang zun ting ;
..............
page:28-30
wo guo zheng fu cai gou fa jia zhi mu biao zhi zhi du zhong gou
ma min hu ;, zhao zuo ;
..............
page:31-32
an quan shen ji wei xin xi xi tong bao zhang he chan ye fa zhan ti gong you li zhi chi guan zhu xin xi xi tong an quan shen ji zhong de guan lian fen xi ji shu
cheng zuo ;, gao bo ;, li chao ;, wu zuo ;
..............
page:33-34
hua wei jiang zai rsa2014 da hui shang ji xu fa li
zheng zhi bin ;
..............
page:35-36
xin xi an quan shi chang du you ge zi ding wei
zhong bo ;
..............
page:37
an quan fang hu ti xi zhu ding yao jin ru bian ge qi
zhao liang ;
..............
page:38
guan zhu bu ke hui bi de bian jie xiao shi hua ti
pan zhu ting ;
..............
page:38
xu ni hua + an quan shi fa zhan fang xiang
he qin lin ;
..............
page:39
tui dong mi ma ji shu yu an quan xi tong ye wu xi tong de rong he
zhang quan wei ;
..............
page:39
shen geng jin rong shi chang nu li xiang wai yan shen
zhu peng fei ;
..............
page:40
yi dong an quan wen ti po zai mei jie
tang wei ;
..............
page:41
an quan de fa zhan fang xiang shi zhi neng
zhang ling ling ;
..............
page:41
ipv6 de an quan fang hu jiang cheng wei zhong dian
wang fu guang ;
..............
page:42
yi dong an quan shi xin xi an quan de yan shen
wang zhi hai ;
..............
page:43
an quan shi chang jiang geng jia guang kuo
qi chen ming ;
..............
page:44
chi xu chuang xin shi bu bian de zhan lue dao xiang
fan yuan ;
..............
page:45
wei lai , rong he xi tong jiang bao chi ling xian
yu zhi wei ;
..............
page:46
zheng he duo ceng ci de an quan jia gou
check point gong si ;
..............
page:47
di wu wei kong jian xu yao shi me yang de jing shen zhi zhu zhao zhan sheng jiao shou fang tan
yang chen ;
..............
page:48-51
an quan jian she ce lue xian xing dui hua jiang nan tian an gong si zong jing li deng xiao si
tang li ;
..............
page:52-55
xin xi an quan ce lue bian zhi zhi nan xu yan
wu shi zhong ;
..............
page:56-57
2013 nian ou meng wang luo he xin xi an quan jian she dong tai zong shu
li ji zhou ;
..............
page:58-63
yun ji suan xu ni hua huan jing zhong de an quan deng ji bao hu
zhou xiao fen ;
..............
page:64-66
chan ye qu shi
..............
page:67
Symbolic Register Monitoring in JRE Native Vulnerability Mining
HUAN Fei;,LI Xiao;,NIE Sen;,ZHAO Tong-tong;
..............
page:68-72,77
Internet Vehicle Platform based on Multi-level Security
REN Fei;,WU KaiJun;,ZENG Bing;
..............
page:73-77
Regulations First in Real-Name Network
GUO Gang;,MA Ding;,TAN Ping-zhang;
..............
page:78-79,84
Security Audit Cloud for Mobile Internet
WANG Zhi;,XU Shi-yuan;,ZHANG Hong;,ZHAO Fang-fang;
..............
page:80-84
Designated-Verifier Proxy Multi-Signature Scheme without the Third Party
ZHANG Xing-hua;
..............
page:85-87,91
Research and Implementation of File Synchronization System
LIU Jun;,SHI Zhu;,YE Yong;
..............
page:88-91
Application of Lua Language in Security Device Management System
LEI Bo;,LIU Dong;,MIAO Xin-liang;,YANG Yuan-hui;
..............
page:92-94
Analysis and Improvement of Remote User Authentication Scheme
HU Yong;,ZHANG Fang-qi;
..............
page:95-97
Design of A New Security Isolation System
REN Zheng;,TANG Liu-hua;,ZENG Yong-quan;
..............
page:98-100
A Dynamic Assessment Algorithm for Network Entity's Credit Rating System
LI Hao;,YANG Bing;,ZHANG Bao-wen;,ZHANG Jing-hai;
..............
page:101-105
Classified Protection Requirements for Virtualization Technology in Cloud Computing System
LI Hao;,YANG Bing;,ZHANG Bao-wen;,ZHANG Jing-hai;
..............
page:106-111