Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2006 Issue 6
Research on Voice Encryption of Trunking Communication System
Tan Xuezhi;Wang Yaning
..............
page:75-77
A Blind Signature Scheme Based on ECDSA
Lin Xianchao;Yang Shoubao;Shan Laixiang;Han Bing
..............
page:78-80
Handwriting Identification Based on Gray Co-occurrence
Yang Zihua;Wu Min;Liu Zheng
..............
page:81-83
A New Algorithm Available for Forgery Detection of Printed Image
Zhang Liqiang;Tan Jichun;Wang Xiaofeng
..............
page:73-74,77
The Issue Studying about Network Against Psychological Warfare
Jin Jiacai;Hu Shuangxi;Lan Hanping
..............
page:70-72
Group Key Agreement Protocol for DPG
Zheng Shihui;Zhang Guoyan
..............
page:66-69
The Design of Controllable Security Web Based on PKI
Liu Baosheng;Xu Jun
..............
page:64-65,69
The Research of Network Security Management Framework Based on Component Technology
Huang Chengxia;Yang Lin;Ma Lingru;Li Jingpeng
..............
page:61-63
The Application of A kind of Distributed IDS in Wireless LAN
Qiu Hu;Zhang Ji
..............
page:58-60
A Mathematical Model on Evaluating IDS System's Efficiency
Qi Jianqing
..............
page:55-57
Infosec Protect System Combines Sofeware with Hardware
zhong an ke ji ji tuan
..............
page:54
"Border Defense Safeguard" of Dawning "Tridimensional Security"
..............
page:50
TBEA Successful Case of Succendo SSL VPN
..............
page:48-49
Legendsec' Secure Solution for Mid- and Small-scale Enterprise
wang yu shen zhou ke ji you xian gong si
..............
page:46-47
F5 Case Analysis-XX Mobile Pleasant Bell Program
Wang Yimin
..............
page:45
Study in Building PKI/CA about Our Nation's E-Governance
Tong Junliang
..............
page:42-44
The Role-based Crossed Distributed Authorization Model in the E-government
Jiang Fuwei;Huang Qin;Liu Yuliang;Li Nan
..............
page:39-41
Taiji Information Security--Hammer"National Team of Information Security"
Xu Yuanyuan
..............
page:37-38
Checkpoint Makes More Efforts to Push Forward the China's Market
Yu Jue
..............
page:36
What Will Outside Package of Service Bring for Enterprises' Information Security?
Yu Jue
..............
page:35
KINGSO Will Speed up to layout the Enterprise Level Market
Cui Guangyao
..............
page:34
Safenet's Products Make Hard Disk&File Secure
Chen Zhaoyun
..............
page:33
Websense' Secure Software Has Upgraded into V6.2
Cui Guangyao
..............
page:32
The Times of Vast Secure Region Is Coming
Cui Guangyao
..............
page:1
The World Telecom Day, Make the Global Network Securer
..............
page:2-5
Ministry of Public Security:Virtual Police Will Be Popularized in Eight Cities as an Attempt
..............
page:6
The World Telecom Day Reveals Secure Command Sign
cui guang yao ; chen bao sheng
..............
page:11-15
The Research for Risk Regulation Model of Information System Life Cycle
Li Qiang
..............
page:16-17
Multi-layers Digital Monitoring Network Security Model Based on Seal Combination
niu ming bo ; shi hao shan ; niu hai fa ; wei huai zuo
..............
page:18-20
The Design Thought to Rank Infosec Protect System
Wu Hongzhong;Ding Shiping
..............
page:21-23
Set root in the fertilized soil of information security
Cui Guangyao;Hu Xiaohe
..............
page:24-27
SBR Information' Philosophy for Intranet Security
Hu Xiaohe
..............
page:28-29
8e6 Company Walks the Campus Route
Cui Guangyao
..............
page:30
Trend Micro Has Started up the Intelligent Protect Strategy against Security Threat
Cui Guangyao
..............
page:31
The Equivalence of Discrete Logarithms Between Elliptic Curve and Real Quadratic Function Field over Finite Field in Characteristic 3
Wang Jiayu
..............
page:84-86
Establish Security Operation Center (SOC) Based on Security Domain
Zhou Zhibo
..............
page:87-89
The Way to Calculate and Detect the False Negative and Positive of IDS
Jiang Chunxiang
..............
page:90-91
RDF Based Content Delivery Network
Song Jiangwang;Mi Zhengkun;Cheng Jizhen
..............
page:92-93,97
A Design of the OSR Algorithm
Yang fu;Xiao Qianxiang
..............
page:94-97
The Research of FH Signal Detection Based on Time-Frequency Distribution
Zhao Hongwei;Li Yong
..............
page:98-99,102
Research of Carrier Tracking Loop for OFDM
Jiang Hua;Shi Qing;Yuan Xiaobin;Liu Haitao
..............
page:100-102
Design of OFDM Transmitting and Receiving Module
Chen Zhenguang;Zhang Huisheng;Du Jia
..............
page:103-105