Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2005 Issue 11
Study of the Informational Security in GSM
Deng Hongchao;Hu Hanying;Deng Li
..............page:69-71
A Study about WLANOs Security
Song Nana;He Fangbai
..............page:72-73,78
Analysis of the Hardware CSP Operation through CryptoAPI
Kang Rongbao;Luo Hui;He Zhiping;Tan Xinglie
..............page:65-68
A Safe Reprogramming Scheme Based on FPGA&DSP Digital System
Li Tingsheng
..............page:62-64
The Research about the Security of Communication Based on SIP
Guo Li;Wang Shilong;ZhangTeng
..............page:55-58
Spy-ware's security risk: we should become more clever
David M.Piscitello
..............page:48-49
USB application solution from "Ball Cactus" Z 32 Series
shen zuo shi zhong xing ji cheng dian lu she ji you xian ze ren gong si
..............page:42-44
Have you patched your operating system?
Wang Jia
..............page:38-40
Dongruan security lets application pragmatic and trusted
Cui Guangyao
..............page:36-37
Rebuild a five-year grand occasion of infosec
Cui Guangyao
..............page:1
Industry Events
..............page:8-10
Overview of China's infosec tech and product development
Chu Yonggang
..............page:15-17
A sketch of general manager Bi Ran from Tianxing Wang'an
Wang Yafei
..............page:19-20
High-profitable marketing tech
Wang Yafei
..............page:21-22
Payment security°TMa non-soft subject
Xiao Yang
..............page:23-24
Any room for firewalls?
Cui Guangyao
..............page:25
Shanghai Ge'er: your security is our duty
Bai Su
..............page:26
Go close to Wangkang and study content security
Zhang Jing
..............page:27
Process for trusted computer application
Cui Guangyao
..............page:28
Create splendid results hand in hand, win nine cities jointly
jin shan ding jian
..............page:30
The Analysis and Application of 802.1x Protocol
Yu Qinyong
..............page:85-89
An admission control architecture based on DiffServ
Ma Li;Chen Kai
..............page:90-92
The JAVA Implementation of ID Authentication with Digital Signature Based on RSA
Zhang Yu;Fei Wenxiao;Yu Bo
..............page:99-101,105
Security Policy of Semantic Intelligent Multi-Agents
Zhang Chengli;Chen Jianbo;Qi Kaiyue;Lu Beiting
..............page:102-105
An Algorithm of Text Steganography
Ye Chengyin;Bi Yushen;Zhang Xuesong;Qi Jianyun
..............page:106-108
Research on infosec of secret-involved computer terminal
yang chun shan ; xu jun chao ; meng yang ; cao wei ; cheng lei ; xu liang ; yu zuo
..............page:109-111
The Wireless Data Acquisition System of GSM/GPRS
Liu Yonglu;Yi Honggang;Gong Xianfeng;Wang Changsong;Yang Fang
..............page:112-114,120
A collision-avoid dynamic slots assignment algorithm based on fixed TDMA
Peng Gexin;Xie Shengli;Chen Caiyun
..............page:115-120
Net processor and high performance stateful Firewall
Wang Airong
..............page:121-122