Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2015 Issue 2
xin ji shu xin ying yong cui sheng an quan xin chang tai
qing zuo ;
..............
page:6-7
guo ji wang luo he xin xi an quan fa zhan dong tai
..............
page:10-11
hai wai shi ye
..............
page:12-12
zhong guo zheng shi zu jian wang luo kong jian yan jiu yuan
..............
page:13-13
lu zuo ru xuan quan qiu hu lian wang zhi li lian meng
..............
page:13-13
quan mian kai zhan dui wang luo qiao zha he you chang shan tie de zhuan xiang zheng zhi huo dong
..............
page:13-13
wang luo an quan shen cha ban fa xia yue jiang ti jiao shen yi
..............
page:13-13
shu zi
..............
page:14-14,15
re ci - hai wai
..............
page:14-14
re ci - guo nei
..............
page:15-15
2014 nian wang luo kong jian an quan wen ti zong shu yu zhan wang
ding yu ;, zuo zhi an ;, jiao jian wei ;
..............
page:16-21
ju jiao xing ye guan cha shen ru zheng ce jie du
hui zhi bin ;
..............
page:22-22
mei guo wang luo xin xi chan ye fa zhan jing yan ji dui wo guo wang luo qiang guo jian she de qi shi
hui zhi bin ;
..............
page:23-25
ri ben wang luo xin xi chan ye fa zhan jing yan ji qi shi
zhou ji li ;
..............
page:26-30
quan qiu hei ke shi chang fa zhan gai shu
shi jian bing ;
..............
page:31-34
quan qiu wang luo xin xi an quan chan ye fa zhan qu shi yan jiu -- ji yu chan ye bing gou yu tou zi de guan ce shi jiao
wang zuo bo ;
..............
page:35-37
wang luo xin ji shu de jing cai yu wu nai
ben kan bian ji bu ;
..............
page:38-39
chan ye jie ying jie xin ji shu dai lai de wu xian ke neng
yang chen ;
..............
page:40-45
wang luo xin ji shu xia wo guo mian lin de wang luo feng xian jia ju
xiao wei dong ;, hou shu qiang ;, dan ao dan ;
..............
page:46-47
zheng wu yun huan jing shang dai ke fu xin ji shu feng xian
feng wei ;
..............
page:48-50
wan wu hu lian wang dai lai de xin feng xian ji qi ji shu dui ce
zhang wei li ;, feng wei ;
..............
page:51-52,55
che lian wang ju ji xin ji shu feng xian an quan shou duan dai jia qiang
wang chuang ;
..............
page:53-55
gong ye zhi neng hua yin fa xin de an quan tiao zhan
liu ying ;
..............
page:56-57
ke chuan dai she bei tu xian xin ji shu feng xian
zhu rui ;
..............
page:58-60
gong xin bu jia da wang luo xin ji shu zhi li li du
meng zuo ;
..............
page:61-62
jia qiang dian fu xing jun shi ji shu zhan lue yu yan de si kao
wang hao jie ;
..............
page:63-65
wang luo xin ji shu zhu zhong guo zi zhu it chan ye wan dao chao che
zhu rui ;
..............
page:66-67
wang luo xin ji shu ling yu qi dai zi zhu ke kong qiang yin -- fang zhong guo gong cheng yuan yuan shi ni guang nan
zhu rui ;
..............
page:68-70
xia yi dai wang luo an quan guan cu an quan qi ye yun ying bian qian -- fang zhi dao chuang yu gong si chuang shi ren ji ceo zhao wei
yang chen ;
..............
page:71-72
yi gu ge jian si lu han wei gong ye zhi neng hua an quan -- fang san ling wei shi gong kong xin xi an quan zhuan jia cheng peng
yang chen ;
..............
page:73-74
gou jian qiang qiang lian he de yi dong an quan sheng tai ti xi -- fang guo xin ling tong gong si ceo hou shu li
zhu rui ;
..............
page:75-77
bao de ke ji ji tuan dong shi chang zhang yun xia huo di er jie shen zuo bai ming xing ye ling jun ren wu shu rong
..............
page:79-79
xin da jie an chan pin zhong duan an quan fang hu xi tong ren ding wei guo jia zhong dian xin chan pin
..............
page:79-79
fei tian cheng xin fa bu di er dai lan ya key
..............
page:80-80
shen qi de an quan bao
..............
page:80-80
yun jia mi fu wu qi
..............
page:80-80
an tian di er jie wang luo an quan dong xun ying zai ha kai mu
..............
page:81-81
rui jie wang luo qian shou itech club & zuo zuo hui wei hu lian wang wang luo ji shu zai tian xin dong li
..............
page:81-81
wei shi tong ni 1 yi yuan she bei jing zi gong si
..............
page:81-81
tu shu tui jian
..............
page:82-82
FPGA Implementation of RFID Encryption Algorithm
XU Yuan-ze;,ZHANG Wen-ke;
..............
page:84-88,91
Confidential System Construction for Research Institute under IT Background
ZHANG Li;
..............
page:89-91
Specific Target Recognition and Control Algorithm based on SIFT Feature
WU Jun;,GUO Jie;,QIU Wei-dong;,XU Peng;,GUO Man;,ZHANG Han;
..............
page:92-96
Implementation of Dynamic Monitoring Platform for Scientific and Technical Risks of Banking Industry
LIU Jian;,GE Jun;
..............
page:97-101
Pre-Computing of GPU-based High-Performance Rainbow Table
JIAN Ling;,XU Sai-sai;,QIU Wei-dong;,GUO Yi-dong;
..............
page:102-104,109
Design and Implementation of Electronic Cash System Schemebased on Blind Signature
BAI Yong-xiang;
..............
page:105-109
SQL Injection Bypass Technology and Defense Mechanism
SONG Chao-chen;,HUANG Jun-qiang;,WU Qiong;,GUO Yi;
..............
page:110-112