Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Beijing Electronics
1006-8503
2008 Issue 4
Analysis of Cloud Computing and Information Security
xie si-jiang feng yan(beijing electronic and science technology institute; beijing 100070; china)
..............page:1-3
A Research on the Security of SMS4 Algorithm
zheng xiu-lin1; 2shen wei1zhang dong3(1; 3.xidian university; xi an shanxi 710071; china; 2.beijing electronic science and technology institute; beijing 100070; china)
..............page:14-18,13
An Approach Based on Commercial Web CRM Web Mining
ang yu-zhen(college of information engineering; lanzhou commercial college; lanzhou gansu 730020; china)
..............page:99-104,55
Digital Rights Management Scheme Based on Trusted Cryptography Module
xu ri1; 2 mao ming2(1.department of telecommunications engineering; xi dian university; xi an 710071; china; 2.beijing electronic science and technology institute; beijing 100070; china)
..............page:9-13
Establishing Courses Section of Timetabling System with Cluster Algorithm
zhang xiao-li1; 2 wang wen-jie2 zhao geng1 1(dept.of computer science and technology; beijing electronic science & technology institute; beijing 100070; china; 2college of distance and continuing education; graduate education at cas; beijing 100039; china)
..............page:4-8
One Method of Testing RIP Router Shaking
wang ling; li ben-xi(liaoning technology university; liaoning; china)
..............page:88-92
The Design and Implementation of Contactless IC Card Read-write Based on GP32 MCU
qin yu-long(department of electronic engineering; suqian college; suqian jiangsu 223800; china)
..............page:105-111
An Implementation of Windows System Call Interception Used For Access Control
li xiaozhe zang meijun dai yiqi(department of computer science and technology; tsinghua university; beijing 100084; china)
..............page:78-83
Application of Virtual Instrument Technology in Students'Extra-curricular Science and Technology Activities
wang wei-zhi; wei zhan-zhen; chen jun; wei tian-hu(department of communication engineering; beijing electronic science & technology institute; beijing 100070; china)
..............page:84-87,77
An Effective Multiple Group Sharing Group Key Management Solution
li xiao-dong(beijing electronic science and technology institute; beijing 100070; china)
..............page:19-24
Remote Sensing Image Classification Based on Wavelet and Fuzzy Integral
zhang ting; liu an-fei(pla 61081; beijing 100094; china)
..............page:66-71,65
Cryptographic Hash Functions and Their Application
zhang dong 1; 2 li meng-dong2xiao peng 1; 2peng cheng-pei 1; 2(1.department of communication engineering; xidian university; xi an shaanxi 710071; china; 2.beijing electronic science and technology institute; beijing 100070; china)
..............page:36-42
The Research on Web Employment Information Extraction Based on HMM
yan yu(southeast university cheng xian college; nanjing jiangsu 210001; china)
..............page:93-98
Identity-based forward secure partially blind signature scheme
zhang xiao-hui1; 2 ou hai-wen1(1key lab of information security and secrecy; beijing electronic science and technology institute; beijing 100070; china 2college of communication engineering; xidian university; xi an; 710071; china)
..............page:61-65
Research of E-Schema-based Mapping from XML Schema to Relational Schema
fan jie1 shang zeng-guang2 xie ting-ting3(1.department of information security; beijing electronic science and technology institute; 100070; beijing; china; 2.department of information engineering; pla academy of armored forces engineering; 100072; beijing; china; 3.department of computer science; beijing electronic science and technology institute; 100070; beijing; china)
..............page:56-60
An Implementation of Prototype System for Trusted LAN Computing Environment
lin jie; li xiao-zhe; dai yi-qi(department of computer science and technology; tsinghua university; beijing 100084; china)
..............page:25-31
A Semantic Analysis Based Approach to Chinese Web-page News Video
jiao li-bing; feng hua-min; he wen-cai; li xue-long(1.department of communication engineering; xidian university; xi an shanxi 710071; china; 2.beijing electronic science & technology institute; beijing 100070; china)
..............page:43-48,42
A Scheme of Strengthening the Security of the EFI BIOS Based on USBKey
yang shao-qian1; 2; chi ya-ping1; fang yong1(1.college of telecommunications engineering; xidian university xian shaanxi 710071; china; 2.beijing electronic science and technology institute; beijing 100070; china)
..............page:32-35,24
P2PSIP authenticated key agreement scheme based on SGC-PKE
zhang rui1 jiang hua1; 2 yang ya-tao2 1.college of communication engineering; xidian university; xi an; 710071; china 2.department of communication engineering; beijing electronic science and technology institute; beijing 100070; china
..............page:49-55
An Analysis of Global Asymptotic Stability of Neural Networks with Time Delay
gao juan(department of economics and management; hengshui university; hengshui hebei 053000; china)
..............page:72-77