Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2016 Issue 2
xin xi dong tai
..............page:3,5,10-15,22-25,80-83
nin de qi xu he wo men de fen li qian xing
li gang ;
..............page:7
da shu ju mian lin de tiao zhan fu za jian ju
chen jing ;
..............page:20
da shi xiao qing guan hu guo ji min sheng
zhang ran ;
..............page:30-31
you xi yu le lei app xian ju bao zhong zai qu
wu xiao zuo ;
..............page:34-35
jing tao pai an shu wang luo an quan ren wu , huan kan jin chao
wo long chuan shuo ;
..............page:44-45
guo nei wang an xing ye jing zheng ge ju da bian lian
jun fang ;
..............page:56-57
wei xin hong bao de zheng que da kai fang shi
wu xiao zuo ;
..............page:62-63
gong kong wang luo an quan qiao xiang jing zhong
sophia;
..............page:66-67
tan xun na xie yin ni yu shi de shang hai lao nong tang
zheng xiao xiao ;
..............page:86-87
Modeling of the Classified Protection for Virtual Cloud on Ontology
LING Yan-ao;,ZHANG Bao-wen;
..............page:93-98,105
DCAS Terminal Design based on TrustZone
HAO Yong-gang;,LI Wang-wei;,WEI An-ming;,XIAO Hui;,HUANG Zheng;,GUO Jie;
..............page:99-105
Mobile Office Security Solution based on Virtuliaztion Technology
HU Xue-lei;,REN Fei;,LI Dong;
..............page:106-108
A High-Security Implementation of Network Data Transmission
LAI Yu-yang;,XU Ping-jiang;,FANG Chao;,TANG Xiao-ke;,ZHANG Hai-Feng;,OU Jun;
..............page:109-112
Detection of Double MPEG Compression with Same Bitrate
CHEN Jie-yuan;,JIANG Xing-hao;,SUN Tan-feng;
..............page:113-116,122
Analysis and Prospect of Physical Isolation Technology for Network Security
WANG Yong-jian;,YANG Jian-hua;,GUO Guang-tao;,LIU Yong-tao;
..............page:117-122