Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2005 Issue 9
IRAS Function Implement in NGN
Zhao Kaifeng
..............
page:64-65,69
Security Policy of Mobile Ad Hoc Networks
Liu Yong;Chen Jianbo;Qi Kaiyue
..............
page:66-69
Analysis of The Security of Instant Messaging Software
Chen Zhaoyu;Lin Bogang
..............
page:70-72
Evaluation of Security on IPv4/IPv6 Transition Mechanism
Lai Jihai;Luo Wanbo;Wang Danxia
..............
page:61-63
Put forward e-government construction and guarantee crypto infosec
Li Dadong
..............
page:59-60
SSR 3.0 of Zhonghang Jiaxin
..............
page:58
The technology of 32-bit leads the new age of infosec
shen zuo shi zhong xing ji cheng dian lu she ji you xian ze ren gong si
..............
page:56-57
Strengthen the endpoint security defense and build up more trusted network space
Liu Yuanqing
..............
page:54-55
Showing the security's uniform appearance and internality Algo's new save-king came into the market
..............
page:53
Developing with the industry in the same viechle
Cui Guangyao
..............
page:1
State Secrecy Bureau put out the ability management methods to the integration of station-crypto computers' information systems
Zhang Jing;Zhang Yanjun
..............
page:6-7
Industry Events
..............
page:8-10
The infosec industry Double-ten Selection Award is announced
..............
page:11
Speech of Cai Hong
..............
page:12
Address of the proprieter of Luo Tianwen
..............
page:13
Speech of Yan Wangjia, You Xiaoming and Ren Zengqiang who are the representatives of awarded enterprises
..............
page:14-15
The Denial-of-Service Attacks in Wireless Sensor Network
Wang Jianping;Shi Haoshan
..............
page:73-76
The Honeypot Techniques and Its Application in Campus Networks
Xu qi
..............
page:77-79
An overview of Intrusion Prevention Technique
Hu Zhengbing;Su Jun
..............
page:80-82
The Design and Application of the security E-mail system based on the pretty Good Privacy
Yang Zongde;Liu Fugang
..............
page:83-85
Research of Private Network Security Technology
Zhang Chong-bin;Li Shou-peng;Zhan Xiao-min
..............
page:86-88
A new video encryption algorithm based on H.264 standard
Lin Weiyao;Fang Xiangzhong;Huang Xiuchao
..............
page:89-94
How to effectively keep away the spy and ad software(2)
Yu Chao
..............
page:37-38
The profile of Double-ten Selection Award
..............
page:16-17
The list of Double-ten Selection Award
..............
page:18
Grace of Enterprises General Grace
Wang Yafei
..............
page:19-20
The risk evaluation is from pursuing-void to hot-startup
Cui Guangyao
..............
page:21-24
Research on the security advancement of VOIP systems
Dong Guishan
..............
page:25-28
Collect 6 years of deep exploit and make the shield for gold shield
Gao Li
..............
page:29-30
Problems of e-government security
..............
page:31-32
How can NetEye manage itself
Cui Guangyao
..............
page:33-34
The backside of Juniper's channel exploit plan
zuo hong
..............
page:35-36
The Design and Implementation for a Multi-Pattern Matching Algorithm based on Eigenvalue Calculating
Zhang Jian;Chen Songqiao
..............
page:95-97,101
A New Wideband Speech Codec-VMR-WB in 3G Mobile Communication System
Zhu Min;Yang Zhen
..............
page:98-101
A New Payment Protocol Based on E-cash
Hong Fan;Jing Ying
..............
page:102-104
Research on Authentication Mechanism of Headset-on-Bluetooth
Qi Wenjuan;Wu Xuezhi;Chu Lingyu
..............
page:105-107
An Image Denoising Method Based on Hidden Markov Tree
Pang Wenjun;Li Huifang
..............
page:108-109
Reversibility Analysis of the 60/102/204 Hybrid Cellular Automata
Zhang Chuanwu;Lin Libin
..............
page:110-112
The analysis of the security technologies involved in IPTV system(part Ⅰ )
Yu qinyong
..............
page:113-114
The application of Fangzheng's firewall in Station Tax Bureau's gold-tax engineering
..............
page:51-52
The performance monitor and alarm
Huang Juemei
..............
page:48-50
The general process of the implementation for e-government ranking protection
..............
page:46-47
The distributed solution of the education network's audit
Lin Fei
..............
page:45
The solution of the management of uniting users
zhang xue ping ; yang ren chao ; jia yu cheng
..............
page:43-44
The key locality of the success to crypto units inner networks' management and its build
Zhao Xiaodong
..............
page:42-43
The emphasis of security rest with management
Jiang Chunxiang
..............
page:40-41
Koal is from close-development to market-exploitation
shang hai ge er gong si
..............
page:38-39