Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2004 Issue 1
SOBIG-F raking first on 2003 virus list
..............page:72-73
New cavalry for Internet management
..............page:76-76
Mail security information gate SMG
..............page:77-77
Legend's CISP cultivation:let security service brilliant
cui guang yao
..............page:78-79
Maipu sincerely inviting elites
..............page:80-80
Solutions for banking security
zhang jian
..............page:64-65
A new star in network security field
zhang jing
..............page:60-61
Implementation of network management system event mechanism based on CIM event model
zhou bin ; tie ling ; li ping
..............page:37-39
GSM operator adopting new steps to prohibit cell phone from being stolen
xu ming jie ; li zuo
..............page:35-36
IDA-based key distribution scheme
zhang zhi hui ; fan xiao zuo ; yang yi xian
..............page:33-34
Research on identity certification system of LDAP directory service
zheng xiao guang ; tie ling ; zhu hong wen
..............page:30-32
Pay attention to subtleness so as to soar high
xiang yong yang
..............page:28-29
Grasp new opportunity, initiate new situation
luo tian wen
..............page:1-1
Academician specialists' New Year words
wang ya fei
..............page:6-7
Strengthen infosec assurance
..............page:8-11
A new generation of ECM:New Interwoven
li xue
..............page:57-58
IPv6 application approaching near
li xue
..............page:56-57
Perfect management so as to yield "gains"
xiang yong yang
..............page:54-55
How to do well infosec management of e-government
zheng qi shu
..............page:52-53
Zhang Yong:let Nokia even more outstanding
ai xin
..............page:48-50
A key escrow scheme with functionality of deception identification
shen liang ; tie ling ; li jian hua
..............page:45-47
Techniques to raise firewall performance
liu zuo ; li zhi tang
..............page:43-44
Research on UMTS access security
li zuo ; liu zheng jun ; tan shui ying
..............page:40-42