Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2006 Issue 6
Research on Voice Encryption of Trunking Communication System
Tan Xuezhi;Wang Yaning
..............page:75-77
A Blind Signature Scheme Based on ECDSA
Lin Xianchao;Yang Shoubao;Shan Laixiang;Han Bing
..............page:78-80
Handwriting Identification Based on Gray Co-occurrence
Yang Zihua;Wu Min;Liu Zheng
..............page:81-83
A New Algorithm Available for Forgery Detection of Printed Image
Zhang Liqiang;Tan Jichun;Wang Xiaofeng
..............page:73-74,77
The Issue Studying about Network Against Psychological Warfare
Jin Jiacai;Hu Shuangxi;Lan Hanping
..............page:70-72
Group Key Agreement Protocol for DPG
Zheng Shihui;Zhang Guoyan
..............page:66-69
The Design of Controllable Security Web Based on PKI
Liu Baosheng;Xu Jun
..............page:64-65,69
The Research of Network Security Management Framework Based on Component Technology
Huang Chengxia;Yang Lin;Ma Lingru;Li Jingpeng
..............page:61-63
The Application of A kind of Distributed IDS in Wireless LAN
Qiu Hu;Zhang Ji
..............page:58-60
A Mathematical Model on Evaluating IDS System's Efficiency
Qi Jianqing
..............page:55-57
Infosec Protect System Combines Sofeware with Hardware
zhong an ke ji ji tuan
..............page:54
TBEA Successful Case of Succendo SSL VPN
..............page:48-49
Legendsec' Secure Solution for Mid- and Small-scale Enterprise
wang yu shen zhou ke ji you xian gong si
..............page:46-47
F5 Case Analysis-XX Mobile Pleasant Bell Program
Wang Yimin
..............page:45
Study in Building PKI/CA about Our Nation's E-Governance
Tong Junliang
..............page:42-44
The Role-based Crossed Distributed Authorization Model in the E-government
Jiang Fuwei;Huang Qin;Liu Yuliang;Li Nan
..............page:39-41
Safenet's Products Make Hard Disk&File Secure
Chen Zhaoyun
..............page:33
Websense' Secure Software Has Upgraded into V6.2
Cui Guangyao
..............page:32
The Times of Vast Secure Region Is Coming
Cui Guangyao
..............page:1
The World Telecom Day Reveals Secure Command Sign
cui guang yao ; chen bao sheng
..............page:11-15
Multi-layers Digital Monitoring Network Security Model Based on Seal Combination
niu ming bo ; shi hao shan ; niu hai fa ; wei huai zuo
..............page:18-20
The Design Thought to Rank Infosec Protect System
Wu Hongzhong;Ding Shiping
..............page:21-23
Set root in the fertilized soil of information security
Cui Guangyao;Hu Xiaohe
..............page:24-27
SBR Information' Philosophy for Intranet Security
Hu Xiaohe
..............page:28-29
8e6 Company Walks the Campus Route
Cui Guangyao
..............page:30
RDF Based Content Delivery Network
Song Jiangwang;Mi Zhengkun;Cheng Jizhen
..............page:92-93,97
A Design of the OSR Algorithm
Yang fu;Xiao Qianxiang
..............page:94-97
The Research of FH Signal Detection Based on Time-Frequency Distribution
Zhao Hongwei;Li Yong
..............page:98-99,102
Research of Carrier Tracking Loop for OFDM
Jiang Hua;Shi Qing;Yuan Xiaobin;Liu Haitao
..............page:100-102
Design of OFDM Transmitting and Receiving Module
Chen Zhenguang;Zhang Huisheng;Du Jia
..............page:103-105