Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2005 Issue 11
Study of the Informational Security in GSM
Deng Hongchao;Hu Hanying;Deng Li
..............
page:69-71
A Study about WLANOs Security
Song Nana;He Fangbai
..............
page:72-73,78
Network security balance policy according to risk analysis and cost budget
Gan Quan
..............
page:74-78
Research on Decision-making Model of Information System Security
Wang Zhenlei
..............
page:79-81
Analysis of the Hardware CSP Operation through CryptoAPI
Kang Rongbao;Luo Hui;He Zhiping;Tan Xinglie
..............
page:65-68
A Safe Reprogramming Scheme Based on FPGA&DSP Digital System
Li Tingsheng
..............
page:62-64
Research and Application of Network Security Architecture Based on Firewall and VPN
Chen Shiqiang;Zhang Wen
..............
page:59-61
The Research about the Security of Communication Based on SIP
Guo Li;Wang Shilong;ZhangTeng
..............
page:55-58
Thinkpad security reform: each time an open-up
..............
page:52-54
TruPrevent enterprise version from Founder Panda Invasion Protection
..............
page:51
A-new-generation King-Memory -brand-new tech lets data storage more secure
..............
page:50
Spy-ware's security risk: we should become more clever
David M.Piscitello
..............
page:48-49
Publication of tested products by Quality Supervision and Test Centre for Computer Infosec Products of MPS(Part 1)
..............
page:45-47
USB application solution from "Ball Cactus" Z 32 Series
shen zuo shi zhong xing ji cheng dian lu she ji you xian ze ren gong si
..............
page:42-44
Check Point firewall aids large local telecom enterprises
..............
page:41
Have you patched your operating system?
Wang Jia
..............
page:38-40
Dongruan security lets application pragmatic and trusted
Cui Guangyao
..............
page:36-37
How to refine" hierarchal security architecture"
..............
page:34-35
Modular Design rebuilding network security architecture for large enterprises
Zhou Guowei
..............
page:31-33
Rebuild a five-year grand occasion of infosec
Cui Guangyao
..............
page:1
Vice head of State Secrets Bureau, Cong Bing: pay close attention to the formulation of laws and regulations, strengthen the work of management and implementation
..............
page:6-7
Vice director of legality Office of State Council, Zhang Qiong: strengthen infosec management, perfect laws and regulations
..............
page:7
Industry Events
..............
page:8-10
The developing trends of information security in furture five years
Cui Guangyao
..............
page:11-14
Overview of China's infosec tech and product development
Chu Yonggang
..............
page:15-17
Zhou has the magic weapon and is sure to win the expedition
Wang Yafei
..............
page:18,20
A sketch of general manager Bi Ran from Tianxing Wang'an
Wang Yafei
..............
page:19-20
High-profitable marketing tech
Wang Yafei
..............
page:21-22
Payment security°TMa non-soft subject
Xiao Yang
..............
page:23-24
Any room for firewalls?
Cui Guangyao
..............
page:25
Shanghai Ge'er: your security is our duty
Bai Su
..............
page:26
Go close to Wangkang and study content security
Zhang Jing
..............
page:27
Process for trusted computer application
Cui Guangyao
..............
page:28
Argument on event "Software security products suspected of being involved in monopoly"
Zhang Jing
..............
page:29
Create splendid results hand in hand, win nine cities jointly
jin shan ding jian
..............
page:30
The theory and deployment of Security Operations Center(SOC)
Guan Guohua
..............
page:82-84
The Analysis and Application of 802.1x Protocol
Yu Qinyong
..............
page:85-89
An admission control architecture based on DiffServ
Ma Li;Chen Kai
..............
page:90-92
The network status recognition based on double factor authentication technology
Shi Guojun;Li Qiang
..............
page:93-95
Huffman coding of many entity and demonstrating of the optimization
Zheng Shilin
..............
page:96-98
The JAVA Implementation of ID Authentication with Digital Signature Based on RSA
Zhang Yu;Fei Wenxiao;Yu Bo
..............
page:99-101,105
Security Policy of Semantic Intelligent Multi-Agents
Zhang Chengli;Chen Jianbo;Qi Kaiyue;Lu Beiting
..............
page:102-105
An Algorithm of Text Steganography
Ye Chengyin;Bi Yushen;Zhang Xuesong;Qi Jianyun
..............
page:106-108
Research on infosec of secret-involved computer terminal
yang chun shan ; xu jun chao ; meng yang ; cao wei ; cheng lei ; xu liang ; yu zuo
..............
page:109-111
The Wireless Data Acquisition System of GSM/GPRS
Liu Yonglu;Yi Honggang;Gong Xianfeng;Wang Changsong;Yang Fang
..............
page:112-114,120
A collision-avoid dynamic slots assignment algorithm based on fixed TDMA
Peng Gexin;Xie Shengli;Chen Caiyun
..............
page:115-120
Net processor and high performance stateful Firewall
Wang Airong
..............
page:121-122