Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Beijing Electronics Information Time Guiding
1006-8503
2016 Issue 2
Dynamic Data Security Schema Based on DIFC in SaaS
Zeng Ping;Sun Wei;Hu Ronglei;Beijing Electronic Science and Technology Institute;College of Communication Engineering;Xi’dian University;
..............page:1-6
Analysis Based on Technology of Rootkit Hidden
Han Yanyan;Zhang Xiaofei;Liu Peihe;Beijing Electronic Science and Technology Institute;
..............page:7-11
Applications of SSE2 and AES-NI on Cryptographic Algorithm
Miao Xudong;Zheng Xiulin;Li Yanjun;Beijing Electronic Science and Technology Institute;College of Communication Engineering;Xi’dian University;
..............page:12-16
Study on the Application of Chaos in Secure System
Chen Wei;Bank of Communications;
..............page:17-25
Key Techniques and Protocols of E-mail System
Li Xianquan;Jiang Hua;Kong Liming;Beijing Electronic Science and Technology Institute;Xi’dian University;
..............page:26-30
Research on the System of Electronic Voucher Based on NFC
Chen Penghui;Xie Sijiang;Tang Huayi;Liu Jinshuo;Beijing Electronic Science and Technology Institute;School of Computer Science and Technology;Xi’dian University;
..............page:31-37
Research on TrustZone-Based Security Scheme for TEE
Hao Xianlin;Zeng Ping;Hu Ronglei;Beijing Electronic Science and Technology Institute;
..............page:38-44
A Personalized Recommendation Algorithm Research of Group Purchase Goods
Yan Xiaoshan;Mi Hongjuan;Information Engineering College;Lanzhou University of Finance and Economics;
..............page:45-50
Design and Implementation of Data Processing Mechanism for Ethernet Security Gateway
Li Zhaobin;Mao Fangyi;Wang Yaojun;Beijing Electronic Science and Technology Institute;
..............page:51-57
Hardware Trojan Detection Method Based on Power Characteristics Template
Sun Kewang;Cui Qi;Wang Sixiang;Beijing Electronic Science and Technology Institute;
..............page:58-64
The Scheme Design of Emergency Communication Platform Based on Mobile VPDN
Hu Rongjian;Zeng Ping;Zhang Xibo;Unit 61416;PLA;Beijing Electronic Science and Technology Institute;
..............page:65-72
A Dynamic Detection Method for Android Malware Based on API Mark
Liu Peihe;Huang Siyi;Yan Xiangyu;Department of Communication Engineering;Beijing Electronic Science and Technology Institute;
..............page:73-78
The Scheme of the Spot Electronic Voting Security Design
Zhang Ning;Yuan Zheng;Tian Xiaoli;College of postgraduate;Beijing Electronics Science and technology Institute;College of information security;Beijing Electronics Science & technology Institute;
..............page:79-83
Hardware Trojan Detection Based on K-means Algorithm
Wang Boren;Qu Ming;Beijing Electronic Science and Technology Institute;
..............page:84-87
Design and Implementation of Android Software Platform Based on Tibetan Language Learning
Wang Shubei;Yong Cuo;Zhao Dongcai;Research Center of Tibetan Information Technology;Tibet University;
..............page:88-92
Application of Commercial Cipher Technology in the Protection of Business Secrets of Central Enterprises
Wang Haitao;Department of Information Management;Power Construction Corporation of China;Ltd.;
..............page:93-96