Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2003 Issue 2
Certification system for e-government digital-certificate
..............
page:76-76
Two products from Haixin Digital won first prize
xiang yong yang
..............
page:75-76
Announcement of certified products and systems (2002) from China Authoritative Testing and Evaluation Centre
..............
page:70-74
Who will be a "cleaner" for rubbish message
wang lin
..............
page:68-69
Qimingxingchen's innovation and management
wang ya fei
..............
page:66-67
Among all security methods infatuated only with encryption
wang lin
..............
page:64-65
Exploration of customer information security
wang hu
..............
page:62-63
Developing but never lose its features -- An account on Tianrongxin's marketing road in 2002
li xue
..............
page:60-61
Security system integration provider escorts e-government
zhao chun hong
..............
page:58-59
When intelligence runs into cause... -- An interview with Dr. Yang Lizhi, general manger of Jingtai Network Science and Technology Corp.
guo feng qin
..............
page:55-57
Yu Huan's" liberalism"-- A sketch on Yu Huan, general manager of Zhongruan Huatai Corp
wang ya fei
..............
page:52-54
Isolation solution for security of secrecy-involved network
zhang shao bo
..............
page:48-51
Building evidence legal system of e-commerce security
liu pin xin
..............
page:44-47
Analysis on security of banking network
lin yan
..............
page:42-43
Application of digital signature and problems to be resolved in China
yan bo
..............
page:40-41
Analysis on intrusion detection technology
liu cai xia
..............
page:38-39
Network security technology applied in routers
chen yan hua ; lu kang jun ; li xiang he
..............
page:35-37
Research on embedded LINUX operating system
feng jing ; xue chun hua ; guo hong xia
..............
page:33-34
TEPEST protection: shied for electromagnetic leakage of secrecy-involved information
zhu da li ; sun de gang ; du hong
..............
page:30-32
Weed through the old to bring forth the new, elegance and brilliance all the way
xiang yong yang
..............
page:27-29
Ideal state of quality-brand pursuit--An interview with Sheng Dengfeng, Vice president of Founder Corp. And general manager of inforsec department
cui guang yao
..............
page:24-26
China's PKI Strategic Development and Application Symposium opened in Beijing
..............
page:23-23
Qinghua Deshi won project certificate from Beijing Municipal Commission of Science and Technology
..............
page:22-22
Mutual dependence, sincere service
..............
page:21-21
Security policy on e-government
zuo an zuo ; liu liang chao
..............
page:19-20
Simple improvement is unable to guarantee network security
xu zuo sheng
..............
page:17-18
Striking success in building of infosec bases
li xue
..............
page:15-16
General review on China's information security of 2002
wu shi zhong
..............
page:10-14
Grand figure sight of 2003 government agency informatization
xin wen
..............
page:9-9
Actively building the legal system of infosec
liu pin xin ; li ze cai
..............
page:5-5
Government on network and information security
mu zi
..............
page:6-8
Wu Jichuan lays stress on enhancing consciousness of Internet security
ze wen
..............
page:8-8
Monument to information theory, originator of cryptography -- An account at 2nd anniversary of Dr. Shannon's passing-away
cui guang yao
..............
page:77-78
On cultivation of infosec
zhao chun hong
..............
page:79-80