Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2016 Issue 1
xin xi dong tai
..............page:3,5,10-15,22-23,25,88-91
zuo wang xin jie zui hao de za zhi
li gang ;
..............page:7
guan zhu zhi neng zhong duan fa zhan de san da qu shi
huai jin peng ;
..............page:17
di er jie shi jie hu lian wang da hui da ka shuo
an sheng ;
..............page:34-37
chi cheng xu ni kong jian shou hu wang luo an quan
mu xu ;
..............page:44-45
hu lian wang zhi guang shan yao wu zhen
an sheng ;
..............page:46-47
dong you wu zhen dao guo bian bu zeng li kai
zheng xiao xiao ;
..............page:50-53
ji xuan ze an quan jiu wu xu pa ma fan
wu xiao zuo ;
..............page:54-55
an bei kai qi di wu ling yu de he zi
sophia;
..............page:56-57
zao yu wang luo bao li ye neng bao xian li pei
chulong;
..............page:66-67
shua lian zhi fu fashion bei hou de an quan yin ying
zhang ran ;
..............page:70-71
zhu an quan ren pan shang zhi ye sheng ya xin gao feng
zheng xiao xiao ;
..............page:92-93
zuo li yang cheng yuan yu ni ba bi tong you
zheng xiao xiao ;
..............page:94-95
shu ju kua jing liu dong gui zhi de yan jin yu dui ce
li si yu ;
..............page:96-102
Data Sharing and Protection System based on Cloud Platform
MU Xiang-kun;,LIU Wei-guo;,WANG Yue-hu;,GAO Meng;,LI Song-hui;
..............page:108-112,118
Nude Image Detection based on Sparse Coding and DBN
CHEN Ya-nan;,HUANG Yu-lei;,TANG Lin;,WANG Shi-lin;
..............page:113-118
Protection for Symmetric Algorithm of Crypto Chips based on Software Implementations
YANG Yi-wei;,XIA Bing-bing;,LIU Hui-zhi;,GAN Jie;,ZHAO Dong-yan;
..............page:119-122,127
VANET Security Protocol based on Minimal Trusted Hardware
SHEN Da;,ZHANG Chi;
..............page:123-127
Improving Sensitive Information Detection by Exploiting Results Clustering
ZHANG Liang;,XU Jian-zhong;,LUO Zhun-chen;
..............page:128-130
APT Detection based on Malicious PDF Documents
ZHOU Ke-zheng;,SHI Yong;,XUE Zhi;
..............page:131-136