Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2014 Issue 2
di er shi ge chun tian de duan xiang
qing zuo ;
..............page:6-7
xin xi dong tai
..............page:11-17,112,封3
zi zhu ke kong shi shi xian an quan de bi you zhi lu
shang zuo ;, yang zhan ;
..............page:18-21
jia kuai ji shu chuang xin ying dui cao zuo xi tong an quan feng xian
wang shi ;, zuo xiao dong ;
..............page:22-25
fa zhan ji yu zhong guo wen zi de xin xi ji shu chan ye
hu yue jun ;, yi li ;
..............page:26-27
wang luo chu li qi rang guo chan ying jian ying qi lai
dong jian feng ;, li li ;, wang zun ting ;
..............page:28-30
wo guo zheng fu cai gou fa jia zhi mu biao zhi zhi du zhong gou
ma min hu ;, zhao zuo ;
..............page:31-32
hua wei jiang zai rsa2014 da hui shang ji xu fa li
zheng zhi bin ;
..............page:35-36
xin xi an quan shi chang du you ge zi ding wei
zhong bo ;
..............page:37
an quan fang hu ti xi zhu ding yao jin ru bian ge qi
zhao liang ;
..............page:38
guan zhu bu ke hui bi de bian jie xiao shi hua ti
pan zhu ting ;
..............page:38
xu ni hua + an quan shi fa zhan fang xiang
he qin lin ;
..............page:39
shen geng jin rong shi chang nu li xiang wai yan shen
zhu peng fei ;
..............page:40
yi dong an quan wen ti po zai mei jie
tang wei ;
..............page:41
an quan de fa zhan fang xiang shi zhi neng
zhang ling ling ;
..............page:41
ipv6 de an quan fang hu jiang cheng wei zhong dian
wang fu guang ;
..............page:42
yi dong an quan shi xin xi an quan de yan shen
wang zhi hai ;
..............page:43
an quan shi chang jiang geng jia guang kuo
qi chen ming ;
..............page:44
wei lai , rong he xi tong jiang bao chi ling xian
yu zhi wei ;
..............page:46
zheng he duo ceng ci de an quan jia gou
check point gong si ;
..............page:47
xin xi an quan ce lue bian zhi zhi nan xu yan
wu shi zhong ;
..............page:56-57
chan ye qu shi
..............page:67
Symbolic Register Monitoring in JRE Native Vulnerability Mining
HUAN Fei;,LI Xiao;,NIE Sen;,ZHAO Tong-tong;
..............page:68-72,77
Internet Vehicle Platform based on Multi-level Security
REN Fei;,WU KaiJun;,ZENG Bing;
..............page:73-77
Regulations First in Real-Name Network
GUO Gang;,MA Ding;,TAN Ping-zhang;
..............page:78-79,84
Security Audit Cloud for Mobile Internet
WANG Zhi;,XU Shi-yuan;,ZHANG Hong;,ZHAO Fang-fang;
..............page:80-84
Research and Implementation of File Synchronization System
LIU Jun;,SHI Zhu;,YE Yong;
..............page:88-91
Application of Lua Language in Security Device Management System
LEI Bo;,LIU Dong;,MIAO Xin-liang;,YANG Yuan-hui;
..............page:92-94
Analysis and Improvement of Remote User Authentication Scheme
HU Yong;,ZHANG Fang-qi;
..............page:95-97
Design of A New Security Isolation System
REN Zheng;,TANG Liu-hua;,ZENG Yong-quan;
..............page:98-100
A Dynamic Assessment Algorithm for Network Entity's Credit Rating System
LI Hao;,YANG Bing;,ZHANG Bao-wen;,ZHANG Jing-hai;
..............page:101-105
Classified Protection Requirements for Virtualization Technology in Cloud Computing System
LI Hao;,YANG Bing;,ZHANG Bao-wen;,ZHANG Jing-hai;
..............page:106-111