Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2005 Issue 5
Construct the trustful system basic platform
Yang Renchao
..............
page:78-80
Build the secure campus network's environment
..............
page:77
The analysis of e-commercial payment principle
Shuai Qinghong;Zhang Kuanhai
..............
page:73-76
CA controls security in its hands
Li Xue
..............
page:72
The voice of emergency response
Zhang Jing
..............
page:71
Technologies' innovation lead the secure growing
Cui Guangyao
..............
page:69-70
The team of the emergency response for security events
Joanna Holmes
..............
page:67-68
Syncopate the territory of trustable computing
Cui Guangyao
..............
page:66
Zhonghangjiaxin advocates server's security
WANG Yafei
..............
page:64-65
Security perfermance of Microsoft security
Cui Guangyao
..............
page:61-63
Research on PHS's indoor overcast
Huang Xinjun;Mei Shaochun
..............
page:59-60
The implementation of mobile nodes' connection in wireless sensor networks
XIANG Li;Duan Zhemin
..............
page:56-58
The synchronous algorithm in wireless sensor networks
han cui hong ; li li hong ; zhao er zuo
..............
page:54-56
One new share scheme for generalized dynamic secrets
HUANG Meijuan;Zhang Jianzhong
..............
page:52-53
Improved Hopping Code algorithm
zhu ye hua ; ke jian dong ; liu wen jiang ; rong meng tian
..............
page:50-52
The optimization of mode-matching algorithm in IDS
zhou ying fang ; li qing hua ; jiang sheng yi ; cai xiao
..............
page:48-49
Discussion on the test of software's reliability
Chen Feiqiong
..............
page:45-48
Research on the simulation for physical layer's frame structure of OFDM
shi lei ; xiong jian she ; xu hong mei ; yan guo qing
..............
page:42-44
S/MIME-based SIP security mechanism
WANG Yuanli;Yan Jian
..............
page:40-42
The system of Honeypot to defense the worms' attack
Yang Liulin;Li Ming
..............
page:37-39
Discussion of PKPs implementation mode
Ju Xiuling
..............
page:35-37
The analysis on quantum secret telecommunication system
Chen Hui;Zhu Fuchen
..............
page:32-34
The model for SVM text sort of recessive sentence means
bao xue chao ; sun qiang ; li sheng hong
..............
page:29-31
Zero-knowledge discriminates Ipv6's address-host
Zhao Min;Li Zhitang
..............
page:26-29
Several ideas on China's infosec standards' establishment and implementation
chen xiao zuo ; li bin ; guo tao ; li he tian
..............
page:23-25
Sonic Wall's deep packet-checking engine and security of VoIP
..............
page:81-82
The software of defensing the tampering of webpages is necessary
..............
page:82
VPN has ultimately had the secure envoys
hu chang yue
..............
page:83
Algo's encryption king Ⅲ was shown in the market
..............
page:84
The VPN gateway supporting multi-chain's backup
Shan Rongsheng
..............
page:85
The useful stone supporting ISO17799 is Baoxin's eCop
Guan Hu;Miao Shu
..............
page:86-87
New Products
..............
page:88-90
Construct the harmonious & healthy security environment for networks
..............
page:1
The national infosec guarantee work emphasizes on carrying out
..............
page:6-7
Lnovation and cooperation also for development
..............
page:7
Industry Events
..............
page:8-10
According to the current situation our 5th meeting shown the current industry
Zhang Yanjun;Zhang Jing;Li Xue
..............
page:11-16
Is your mobile -phone secure?
WANG Yafei
..............
page:17-19
The analysis on the card's secure authentication in the payment by net
Luo Xufei
..............
page:20-22