Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Beijing Electronics
1006-8503
2003 Issue 1
Chaotic Cryptography Based on Feistel Structure
zhao geng fang jin-qing(beijing electronic science and technology institute; besti; beijing 100070 ) (china institute of atomic energy; beijing 102413 )
..............page:13-21
ComGIS and its Application in Real Estate Information Query System Development
chen guo-liang wu li-xin li qiu; han guo-jian ying wen(the institute of 3s and subsidence engineering china university of mining and technology (beijing campus)) (beijing guancheng xinji real estate development ltd. company)
..............page:27-32
Development and Application in Multi-agent System
jian lin-sha duan zong-tao(chang an university; xi an: 710064) (northwest polytechnic university; xi an: 710072 )
..............page:41-44
The Main Obstacles of the Overseas M&A Facing the Chinese Enterprises and the Corresponding Measures Analysis
tang yi-hong (university of international business and economics; uibe; beijing: 100029)
..............page:63-68
Properties of Grbner Basis Under linear Map
han ran zhou meng(institution of science; beijing university of aeronautics and astronautics; beijing: 100083)
..............page:1-7
Some Notes on Two Threshold RSA Cryptosystems
ou hai-wen ye ding-feng zheng xiu-lin(department of electronic information engineering; besti; beijing 100070) (state key laboratory of information security; chinese academy of sciences; beijing 100039)
..............page:8-12
Information Network and Construction of the Party
ma hong ji rui-huan(beijing electronic science and technology institute; besti; beijing: 100070)
..............page:74-77
The Strategies and Influences on the Paradigm of Bureaucrat administration by network
zheng shu-cun li ying-lian (shandong qufu normal university is through the law school professor; shandong qufu: 273165 )
..............page:57-62
A Comparative Study on Several Ways of Windows Logon Authentication
xie si-jiang (scientific research center; beijing electronic science and technology institute. beijing; 100070)
..............page:37-40
Some Polices for Secure Password
mao ming yuan zheng tong xin-hai(department of electronic information engineering; besti; beijing: 100070)
..............page:48-50
Design and Analysis of Reconfigurable Cipher Processor
qu ying-jie (postdoctoral station of northeast university; shenyang 110006)
..............page:22-26
Analysis and Utilization of X.509v3 certificate
fang yong(beijing electronic science and technology institute; besti; beijing: 100070)
..............page:33-36
Reality and History--the Second Argumentation On Japanese Textbook Issue
pang hong-ying(school of humanities and social sciences; university of science and technology beijing; beijing100083; china)
..............page:69-73
The Safety Analysis of a Client Program about 263 E-Mail
he wen-cai liu pei-he(department of information and telecome engineering; besti; beijing: 100070)
..............page:45-47
Comparison Between the Two Cultural Argumentations at the Beijing and the End of the 20~(th) Century
wang zhang-wei(beijing normal university; beijing: 100875)
..............page:51-56