Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2005 Issue 9
IRAS Function Implement in NGN
Zhao Kaifeng
..............page:64-65,69
Security Policy of Mobile Ad Hoc Networks
Liu Yong;Chen Jianbo;Qi Kaiyue
..............page:66-69
Analysis of The Security of Instant Messaging Software
Chen Zhaoyu;Lin Bogang
..............page:70-72
Evaluation of Security on IPv4/IPv6 Transition Mechanism
Lai Jihai;Luo Wanbo;Wang Danxia
..............page:61-63
SSR 3.0 of Zhonghang Jiaxin
..............page:58
The technology of 32-bit leads the new age of infosec
shen zuo shi zhong xing ji cheng dian lu she ji you xian ze ren gong si
..............page:56-57
Developing with the industry in the same viechle
Cui Guangyao
..............page:1
Industry Events
..............page:8-10
Speech of Cai Hong
..............page:12
The Denial-of-Service Attacks in Wireless Sensor Network
Wang Jianping;Shi Haoshan
..............page:73-76
An overview of Intrusion Prevention Technique
Hu Zhengbing;Su Jun
..............page:80-82
Research of Private Network Security Technology
Zhang Chong-bin;Li Shou-peng;Zhan Xiao-min
..............page:86-88
A new video encryption algorithm based on H.264 standard
Lin Weiyao;Fang Xiangzhong;Huang Xiuchao
..............page:89-94
Grace of Enterprises General Grace
Wang Yafei
..............page:19-20
The risk evaluation is from pursuing-void to hot-startup
Cui Guangyao
..............page:21-24
Research on the security advancement of VOIP systems
Dong Guishan
..............page:25-28
Problems of e-government security
..............page:31-32
How can NetEye manage itself
Cui Guangyao
..............page:33-34
The backside of Juniper's channel exploit plan
zuo hong
..............page:35-36
A New Wideband Speech Codec-VMR-WB in 3G Mobile Communication System
Zhu Min;Yang Zhen
..............page:98-101
A New Payment Protocol Based on E-cash
Hong Fan;Jing Ying
..............page:102-104
Research on Authentication Mechanism of Headset-on-Bluetooth
Qi Wenjuan;Wu Xuezhi;Chu Lingyu
..............page:105-107
An Image Denoising Method Based on Hidden Markov Tree
Pang Wenjun;Li Huifang
..............page:108-109
Reversibility Analysis of the 60/102/204 Hybrid Cellular Automata
Zhang Chuanwu;Lin Libin
..............page:110-112
The performance monitor and alarm
Huang Juemei
..............page:48-50
The solution of the management of uniting users
zhang xue ping ; yang ren chao ; jia yu cheng
..............page:43-44
The emphasis of security rest with management
Jiang Chunxiang
..............page:40-41
Koal is from close-development to market-exploitation
shang hai ge er gong si
..............page:38-39