Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2015 Issue 11
an ruo bu zai yun he yi qi
..............page:7-7
xin wen
..............page:10-13
shu tu
..............page:14-15
da shu ju -- bian ge shi jie de guan jian zi yuan
miao zuo ;
..............page:16-16
wang luo kong jian quan qiu zhi li xu he zuo gong ying
chen xiao gong ;
..............page:17-17
he xin ji shu bu neng shou zhi yu ren
ni guang nan ;
..............page:19-19
wang luo xin xi an quan ji shu fa zhan qu shi
qing si han ;
..............page:20-20
dt shi dai ji hui wu xian
ma yun ;
..............page:21-21
wang yan
..............page:22-23
jing zhong
..............page:24-25
yun shi dai wang luo an quan de mei meng huan shi jing hun
ben kan bian ji bu ;
..............page:26-27
yun an quan yun shi dai lang chao xia de wang luo di fang
mu zi xiao ;
..............page:28-35
zhong guo yun an quan chan ye xian zhuang sao miao
chen zuo zhi ;
..............page:40-43
mei ri ou shang yan yun an quan san guo sha
chulong;
..............page:44-47
wang luo an quan wei lai yi lai
du yue jin ;
..............page:48-49
hu hang dt shi dai an quan chuang shi ji
wu han qing ;
..............page:50-51
wang yi you xiang bei bao lou dong shi jian shi mo
wu xiao zuo ;
..............page:54-55
ren lian shi bie kai qi shua lian shi dai
an sheng ;
..............page:58-59
shu ju an quan yin fa guo ji fa gui bo zuo
wu xiao zuo ;
..............page:64-65
ao ba ma tuo xie hou men feng bo jiu ci zhong jie
zhang ran ;
..............page:66-67
xin pin
..............page:74-75
Research on SDN Architecture Based Enterprise Network Auditing System
zuo zheng zuo ;, ke wei ;, chen guo song ;, cui zuo bin ;
..............page:78-79
mei ti guan zhu
..............page:80-81
an quan jin qiu hang zhou qiu yi nong
..............page:84-85
wang an guan cha
..............page:86-86
zhong mei wang luo an quan zhan lue de hu dong yu he zuo
lu chuan ying ;
..............page:87-89
Implantation of Android System based on ADB Debugging
FAN Chen-chen;,SHI Yong;,XUE Zhi;
..............page:96-99,102
Cloud Computing Environment and Classified Protection
HUANG Rui;
..............page:100-102
Attacks on Identity-based Digital Signature Algorithm with Short Public Key
ZHENG Hong;,FAN Jia;
..............page:103-104,109
Information Hiding Algorithm based on Lifting Wavelet and CS Technology
TIAN Peng-yi;,XU Ding-gen;
..............page:105-109
Effectiveness and Its Evaluation of Network Security System
LIU Peng;,CHEN Hou-wu;,MA Lin;
..............page:110-113,118
User Behavior in Telecommunication Fraud based on CDR Analysis
ZHOU Guo-min;,CHEN Guang-xuan;,ZHOU Yin-zuo;
..............page:114-118