Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2015 Issue 5
qu ioe, zai lu shang
qing zuo ;
..............
page:6-7
xin xi dong tai
..............
page:10-15,80,87,93
qian tan mei guo ti sheng guan jian ji chu she shi wang luo an quan kuang jia
zhao yan ling ;
..............
page:16-21
zhong mei wang luo xin xi an quan chan ye bi jiao yan jiu
wang zuo bo ;
..............
page:22-26
yi se lie wang luo an quan chan ye qiang guo de ce lue ji qi qi shi
zheng xin ;
..............
page:27-30
wu lian wang chan ye fa zhan ji an quan feng xian yan jiu
shi jian bing ;
..............
page:31-35
guan yu qu ioe de ji dian si kao
hu xiao he ;
..............
page:36-42
qu ioe, qie xing qie si
yang chen ;
..............
page:43-49
zhong guo qi ye he yi bai tuo ioe yi lai zheng
an jing ;, liu zhi ;
..............
page:50-52
zai yun ping tai jia gou xia shi xian qu ioe de ce lue
zhu wei guo ;, chen yang ;
..............
page:53-55
guo wai qu ioe xin xi ji shu ti xi de zhu yao zuo fa ji qi shi
zhou ji li ;, li jun ;
..............
page:56-61
qu ioe bing bu shi pai wai fang bei jing guo xin ling tong wang luo ke ji you xian gong si ceo hou shu li
zhu rui ;
..............
page:62-63
zi yuan zheng he : gou jian liang xing hu dong de xi tong ying yong chan ye lian fang shen zuo shi an dun jiao tu ke ji you xian gong si zong jing li zhang yuan ming
hu xiao he ;
..............
page:64-66
guo chan shu ju ku chang shang yao ba tu po zhong da ji shu nan guan bai zai shou wei fang ren da jin cang gong si zong cai ren yong jie
yang chen ;
..............
page:67-69
qu ioe wo men da dao liao yu qi mu de fang a li ba ba qu ioe zhan lue shi shi zhe zhou bao fang
yang chen ;
..............
page:70-73
ke xue gou jian wang luo an quan wen hua huan jing zhu wang luo zhi li hua yu quan ti sheng
zhang li ;
..............
page:74-75
xin xi an quan fu wu de xian zhuang yan jiu xin xi an quan fu wu ti xi yan jiu zhi er
wang ning ;, luo zuo ;, jiang lei ;
..............
page:76-79
yun yong xin xi an quan ji shu gou zhu shi pin jian kong an quan zhi dun
wang xue long ;, cao bo ;, wu zhen ;
..............
page:82-84
xiao yuan wang luo an quan jian she zi jin gui hua yan jiu
hao shuang ;, wang lei ;, zhang hong ;
..............
page:85-86
qi ming xing chen yun an quan guan li ping tai wei zheng qi yun an quan bao jia hu hang / jian wang luo shen ru chang jing yun ti yan zha gen xing ye /fortinet tong guo si bo lun de jie jue fang an yan zheng fortigate-3810d de tong ji zui jia xing neng
..............
page:88
4.29 shou du wang luo an quan ri wei wang luo an quan chan ye ying zao ji ji de chan ye huan jing
..............
page:89-91
zhong hua gong wang gong tu qiang yi shu chu ban fa xing
yang chen ;
..............
page:92
Infosec Management System based on Classified Protection
GAO Lei;,LI Chen-yang;,ZHAO Zhang-jie;
..............
page:95-98,101
Security Management Strategy for Network Information Stealing in New Era
YANG Yu;
..............
page:99-101
File Protection System based on Application Audit and Transparent Encryption Technology
HE Hui;,CHENG Gong-liang;,LI Jian-hua;
..............
page:102-106
Online SignatureAuthentication
WANG Fei;,SUN Tan-feng;,JIANG Xing-hao;
..............
page:107-111,116
Classification and Grading Method for Industrial Control System based on Hierarchical Protection
LIU Kai-jun;,ZHANG Xiao-mei;,QIAN Xiu-bin;
..............
page:112-116
Detection System of Smart IC-Card Cryptographic Algorithm
WANG Wen-tao;,ZHOU Zhi-hong;,LI Jian-hua;,YAO Li-hong;,WU Jun;
..............
page:117-120