Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2003 Issue 9
SkyWing: a forerunner of biometric software
zheng jie chuan
..............page:70-71
Legend infosec launching" nationwide tour"
cui guang yao
..............page:72-73
Daring to be the first for whipping a horse on in a storm
zhang jing
..............page:74-75
How US Strengthening organizational building of netwar
wei yue jiang
..............page:78-78
Yanxiang high-energy CPU-Hero-1
..............page:79-79
A young phoenix sings better than an old one
cui guang yao
..............page:68-69
Application of Maipu's MP2692 in e-Government
fan jun song
..............page:65-66
Superficial view on intranet security and countermeasures (Part 2)
li gang ; zhou ming
..............page:64-64
Network's mobile zone
..............page:61-62
Identity-certification solution for on-network tax-reporting
bei jing fei tian cheng xin ke ji you xian gong si
..............page:60-60
What kind of software platform needed for e-Government
dai jie jun
..............page:57-59
Zhang Lisheng-An's "new administrator"
wang ya fei
..............page:53-55
Research on application of paging centre in security monitoring system
zhang wang ; gu zhong zuo ; guo pei feng
..............page:49-52
Quantum security communication: an unconditional security communication way
qu hui ming ; liu yu ; wang chang qiang ; mei ling
..............page:46-49
Design and implementation of adapter for intelligent network
wang ying ; zhang wen bin
..............page:42-45
TTDSTM strengthening security of data storage
zhang xing tian
..............page:41-41
Security strategy for network systems of large enterprises
zuo li ; chen xiao su
..............page:38-40
Development trend for invasion detection products
hong zhao xiang
..............page:36-37
Sparking-star of South Korea hard to hide its dash
wang lin
..............page:30-32
Briefs on problems of infosec high-tech and products
han yong fei
..............page:1-1
How to ensure intranet security
zheng jie chuan
..............page:10-12
Study on concept of infosec assessment
qu cheng yi ; chen xiao zuo
..............page:16-20