Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2006 Issue 11
Setting up Information Resource Security Terrace of E-G
Wang Qian;Chen Fang
..............page:129-131
Research of Anti-Phishing Technology
Wu Zhiyong;Sun Lechang
..............page:126-128
Catching Network Intrusion Base on Honeypot
Li Yongxi;Chen Xiaoping;Jia Kun
..............page:132-134
Research on Risk Assessment Based on PDM Life Cycle
Li Hongmin;Ling Ronghui
..............page:135-136,139
Analysis and Realization of Backdoor Based on Linux VFS
Liu Chuan;Xue Zhi
..............page:137-139
Research on the Security and the Influence of AES
Wu Changyin;Yue Qinsong;Wang Yuanfeng;Liu Shouyi
..............page:140-141,144
A Fewer Comparisons Algorithm for Pattern Matching in String
Ning Xiaojun;Huang Liusheng;Zhou Zhi
..............page:158-160
A New Image Steganalysis Method
Liang Bin;Li Shenghong
..............page:161-162,166
Security Analysis and Improvement of A Zero-knowledge Proof Identification Scheme
Zhang Huqiang;Hong Peilin;Li Jinsheng;Xong Jiping
..............page:163-166
Analysis of Covert Channel in Secure Operating System
Chen Song;He Liangsheng;Wang Jianhua;Xu Yang
..............page:167-168,116
Feature Analysis of Content-Based Image Retrieval
Zhang Hao;Wang Shilin;Li Hongsheng
..............page:74-76
Wavelet Package Denoising Method Based on Multiscale Edge Detection
Qu Changhong;Li Huifang;Zhang Chunhe
..............page:77-78
A Study and Design of Network Management System Based on Softswitch
Yuan Zhanting;Zhang Qiuyu;Hua Zhuping;Yu Jianming;Wang Jing
..............page:79-81
An Improved Needham-Schroeder Protocol Based on TPM
Sun Chunyan;Chi Yaping;Fang Yong
..............page:82-84
Trusted Computing and Trustworthy Networks
Zhang Xingang;Liu Yan
..............page:85-87
Research on the Identity Verification of INMARSAT Aeronautical Satellite Communication System
Zuo Qianqian;Liu Ying;Yao Bin;Wei Yumei
..............page:88-90
Security Analyzing and Defending of PHP Injection on the Database Server
Zhu Yun;Xue Zhi;Li Jianhua
..............page:91-93
A Security Data System Base on Embedded Wireless Transmission
Zhou Chengyi;He Dake
..............page:94-96
The Current Situation and Development of Invasion Detection System
Li Ying;Li Liang
..............page:97-99,102
Security Analysis of LAN
Li Fang;Zhou Xi
..............page:100-102
Design and Realization of Mobile Police Affairs Information System
Jiang Feibo;Wang Ling;Liu Hui
..............page:103-105
Some Security Focuses on Personal Communication
Lai Dian
..............page:106-108,111
Research of Public Key-based 3G Security
Fu Xiaoqing;Xu Zhongliang
..............page:109-111
Awareness of Information Security Risk Assessment
Ji Guoxin;Wang Shifeng
..............page:112-113
A Watermarking Algorithm Based on DC or LF Coefficients of DCT Domain
Chu Jun;Wang Ling
..............page:114-116
A Video Watermarking Technology Which Can Protect Video from Frame Dropping Attack
Ji Wen;Zeng Fanping;Liang Kun;Chen Jian
..............page:117-119
Research and Implementation of the Module Binary Analysis for Rootkit Dectection
Zhang Liyun;Xue Zhi;Li Jianhua
..............page:120-121,125
Design of GSM-R Drive Test System
Wu Qianqian;Zhang Huisheng;Huang He;Yun Kuan
..............page:72-73,76
Analysis of Sleeping MAC for Wireless Sensor Networks
Na Chengliang;Zhou Tingxian;Lu Dongxin
..............page:69-71
Research on Route Switching and Allocation of Connecting Orienting Next Generation Net
Chen Jinying;Zhu Jun;Xu Qijian
..............page:64-65,68
Study of Intrusion Detection Based on Alarm Deviation Analysis
Lin Yang;Liu Guiquan;Yang Lisheng
..............page:145-147
A Game Theory Approach for Wireless Sensor Network Security
Zhou Daquan;Miao Hui;He Xiaodong
..............page:148-150
A Blind Watermarking Scheme in Regions of Interest
Wang Bin;Xu Peixia
..............page:151-153
An Algorithm of Noise Reduction Based on Chaotic Synchronization
Wang Zhe;Ye Yalin;Han Kun
..............page:154-155
High-speed Implementation of Elliptic Curve Cryptography in GF(2m)
Wu Yuhua;Zhou Yukun;Li Yanjun;Gao Xianwei
..............page:156-157,160
Algorithm Research for Generating Diversity Detectors
Zhang Hong;Cai Huanfu;Gao Pingan;Zhao Guohong
..............page:62-63
Research on IT Security Vulnerability Announcement Mechanism of US
Meng Jiangbo;Zhang Yuqing
..............page:58-61
NetGAIN; IT Management on the Main Line of Business
Yu Jue
..............page:39-40
Category and Design Principle of Trust System
Xu Yang;Liu Yushu;Wang Jianhua;Song Jian
..............page:53-57
Concerned about the strategy of information security
Cui Guangyao
..............page:7-8
Study of Elements and Indicators in Competitive of National Information Security
zuo shi jie ; lv ke wei ; zhao zhan sheng ; lv shu wang
..............page:20-23
Study of Trusted Computing and Its Development
Yan Xiguang
..............page:18-20
New Security of Information and Infrastructure in Information Technology
Chen Huaping;Chen Qing
..............page:14-17