Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2005 Issue 5
Construct the trustful system basic platform
Yang Renchao
..............page:78-80
The analysis of e-commercial payment principle
Shuai Qinghong;Zhang Kuanhai
..............page:73-76
CA controls security in its hands
Li Xue
..............page:72
The voice of emergency response
Zhang Jing
..............page:71
Technologies' innovation lead the secure growing
Cui Guangyao
..............page:69-70
The team of the emergency response for security events
Joanna Holmes
..............page:67-68
Syncopate the territory of trustable computing
Cui Guangyao
..............page:66
Zhonghangjiaxin advocates server's security
WANG Yafei
..............page:64-65
Security perfermance of Microsoft security
Cui Guangyao
..............page:61-63
Research on PHS's indoor overcast
Huang Xinjun;Mei Shaochun
..............page:59-60
The synchronous algorithm in wireless sensor networks
han cui hong ; li li hong ; zhao er zuo
..............page:54-56
One new share scheme for generalized dynamic secrets
HUANG Meijuan;Zhang Jianzhong
..............page:52-53
Improved Hopping Code algorithm
zhu ye hua ; ke jian dong ; liu wen jiang ; rong meng tian
..............page:50-52
The optimization of mode-matching algorithm in IDS
zhou ying fang ; li qing hua ; jiang sheng yi ; cai xiao
..............page:48-49
Discussion on the test of software's reliability
Chen Feiqiong
..............page:45-48
Research on the simulation for physical layer's frame structure of OFDM
shi lei ; xiong jian she ; xu hong mei ; yan guo qing
..............page:42-44
S/MIME-based SIP security mechanism
WANG Yuanli;Yan Jian
..............page:40-42
The system of Honeypot to defense the worms' attack
Yang Liulin;Li Ming
..............page:37-39
Discussion of PKPs implementation mode
Ju Xiuling
..............page:35-37
The analysis on quantum secret telecommunication system
Chen Hui;Zhu Fuchen
..............page:32-34
The model for SVM text sort of recessive sentence means
bao xue chao ; sun qiang ; li sheng hong
..............page:29-31
Zero-knowledge discriminates Ipv6's address-host
Zhao Min;Li Zhitang
..............page:26-29
Several ideas on China's infosec standards' establishment and implementation
chen xiao zuo ; li bin ; guo tao ; li he tian
..............page:23-25
VPN has ultimately had the secure envoys
hu chang yue
..............page:83
The VPN gateway supporting multi-chain's backup
Shan Rongsheng
..............page:85
The useful stone supporting ISO17799 is Baoxin's eCop
Guan Hu;Miao Shu
..............page:86-87
New Products
..............page:88-90
Industry Events
..............page:8-10
According to the current situation our 5th meeting shown the current industry
Zhang Yanjun;Zhang Jing;Li Xue
..............page:11-16
Is your mobile -phone secure?
WANG Yafei
..............page:17-19