Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2014 Issue 8
xin xi dong tai
..............page:10,12-17,75-77,79-80
wang luo an quan shen cha zhi du hu zhi yu chu
yang chen ;
..............page:18-26
dui hua zhuan jia jian yan shen cha
li xue ;, yang chen ;
..............page:27-33
wang luo an quan shen cha zhi du de gen ben zai yu zhang wo fang yu zhu dong quan
fang xing dong ;, hu huai liang ;
..............page:34-37
deng ji bao hu zhi du xia xin xi an quan chan pin fen ji ce ping ti xi
gu jian ;, lu lei ;, yu you ;, zhang jun bing ;
..............page:40-43
wang luo an quan shen cha ti xi xia de yun ji xian
zhou ya chao ;, zuo xiao dong ;
..............page:44-46
xin xi an quan ce ping gong ju de fa zhan xian zhuang he jian yi
yu fei ;, zhao zhi yong ;
..............page:50-51
jun gong xi tong bao mi gong zuo de ping jia ti xi
ge yang ;, huang xin ;
..............page:52-54
an quan shen cha : wei gong kong xi tong shu qi yi dao an quan ping zhang
zhang yi chi ;, zheng jing ;
..............page:55-56
yin du kai zhan wang luo an quan shen cha de zhu yao zuo fa ji qi shi
ge zuo ;, tang jing ran ;, wang yang ;
..............page:60-64
wang luo huan jing xia bao mi gong zuo tan jiu
zhang hai deng ;
..............page:69-70
da zao zong he hua de wang luo an quan shen ji yu guan li ping tai
xi an jiao da jie pu wang luo ke ji you xian gong si ;
..............page:73-74
Design and Implementation of Private Desktop Cloud
AO Yong;
..............page:81-84
Discussion on Big Data Research
DONG Shu-ying;,ZHENG Yu-hao;
..............page:85-89
Security of Wireless Communication Technology in Electric Network Automation
FU Yi-yu;,LI Xin;,LI Zhao-feng;,QI Yuan;
..............page:90-98
Operational Effectiveness Evaluation Model of Tactical Command & Control System
QING Liang;,WANG He-ming;,YU Jun;,ZOU Xiao-tian;
..............page:99-101
Encoding Decoding Algorithm Program Implementation of RS Code
FAN Xiao-qin;,XIE Rui-yun;,ZHANG Yan;
..............page:102-104,108
Solution of Excessive Personalized Recommendation Service in e-Commerce
LI Yong-zhong;,YAN Qing-hua;
..............page:105-108
Study on Concurrent Performance Test of NPM
GU Bin;,GU Hong-feng;,LIAO Pin-xiu;
..............page:109-111,114
Discussion on Approaches and Methods for Maintaining Confidentiality under New Situation
GUO Gao;,HAO Wei;,WANG Xian-hong;
..............page:112-114
CSRF Attacks on Network Devices
QIAN Wei-jun;
..............page:115-117
Capacity Encryption: Large Key Isometric Encryption
CHENG Bi-bo;
..............page:118-119,123
ClassifiedInfosec Protection of TV Center Network Systems
LIU Yong-jie;
..............page:120-123
Essential Factors of Security and Confidentiality in Classified Applications
DONG Ming-yu;,PENG Lian;
..............page:124-125,129
A High-performance Pre-gatewayiSCSI Storage Encryption Solution
CHEN Yu-Yan;,LUO Hua-Jie;,LUO Jin;,ZHOU Bo;
..............page:126-129
Study on Anti-APT Measures in Military Networks
CAO Mei-qin;,CUI Jin-sheng;,SUN Jing-min;
..............page:130-132