Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2007 Issue 12
Decoding Manchester in Radio Frequency Integrated Circuit Card
DING Ming-jun;XU Jian-cheng
..............page:65-67
"China-guard" Column-Build up the Safe Earthquake Emergency Command System
JIANG Li-xin;XIONG Tai-song
..............page:60-61
Impression on 8th International CC Conference
LIU Yan
..............page:41-42
CIO, Maintainer Who Shows Solicitude for "Security"
BAI Jie
..............page:43-45
Prospects for the Applications of UTM in Future Security Technology
HE Peng;NING Po;REN Chong
..............page:46-48
NAN Xianghao: An Old General on "Plotting-against" Frontline
YANG Ming-qing;ZHANG Xuan-jie
..............page:49-50
Innovation, Fusion and Responsibility Breed New Missions
CUI Guang-yao
..............page:53-54
SoincWALL's New Operating System Came out
CUI Guang-yao
..............page:57
tian rong xin : chan ye guai dian shi bu wo dai
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:11-13
qi ming xing chen : zi zhu ke kong fei xi yan
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:14-15
wang yu shen zhou : ji qing cheng jiu meng xiang
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:16-17
fei tian cheng xin : zhuan ye zhuan zhu da chu yi pian tian
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:17-18
fang zheng an quan : diao zheng mo he jin ru xin jing jie
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:19-20
shen wa dong guang ji liang huan cheng wang : dong ruan wang luo an quan tu po zai ji
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:21-22
san ling sheng an : ju ji nei gong , ze ji bao fa
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:22-23
si zhi ke ji : xin xi an quan shi ge guo cheng
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:23
wei shi tong : rong he gui mo hua da zhong hua he guo ji hua da qu shi
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:24-26
ao tu ke ji : nei re wai leng huan jing yin fa de an quan zou xiang
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:26-27
lian xiang wang yu : fei gai bian bu zu yi cheng da qi
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:27-29
yi sai tong : shui geng you chan ye hua yu quan
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:29-31
shi wei chan ye liang jian feng
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:9-11
ji da zheng yuan : ji ji ying bian cai neng zou chu kun jing
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:31-32
lv meng ke ji : ba ji shu jin xing dao di
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:33-34
sophos: ji xu jie jue " bian yuan shen tou " wen ti
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:34-35
cp secure: an quan de guo du cha yi
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:35-37
jin shan : shang shi hou de an quan geng you bao zheng
cui guang yao ; li xue ; hu xiao he ; bai jie
..............page:37-38
Theory and Simulation of Orthogonal Frequency Division Multiplexing
CUI Xin-rui;ZHANG Jie;ZHANG Jing;LI Hai-feng
..............page:68-69
Detection On Windows(2000/2003) Hidden Process
XUE Ying-fei;SHAN Rong-sheng;LI Xiao-yong
..............page:70-71
The applications of information security risk evaluation and assistant tools
YANG Chun-hui;ZHANG Hao;WANG Yong
..............page:75-77
Design Approach of Data Warehouse Structure Based on Data Center
HAN Kun;XUE Hui;WEI Guo-qing;XUE Song
..............page:78-82,85
A Malicious Software Monitoring Model Based On Windows Registry
SONG Jian-dong;SHAN Rong-sheng;LI Xiao-yong
..............page:104-106
Research Progress of Clustering Technology Applied to Intrusion Detection
WANG Hong;ZHANG Yang;LI Xu-cheng
..............page:107-110
On the Linear Complexity of Generalized Legendre Sequences
ZHANG Hai-yan;CHEN Ke-fei
..............page:111-113
A Scheme of Strengthening the Security of the root of trust for measurement based on USBKey
CHI Ya-ping;Wang Quan-min;WU Li-jun
..............page:114-117
A Research of MIP Based On MPLS Network
ZHANG Bin
..............page:118-119,123
Disposing and Application Method of Network Layer Encryption
YANG Da-wei
..............page:120-123
SERVER Has Its Own Security Standard
LIU Yuan-qing
..............page:56
Industry Events
..............page:3-4
Expecting "Anysec"
MU Ying
..............page:7-8
Research on Hardware Acceleration for Network Intrusion Detection
HAN Hong-zhe;BI Xue-yao
..............page:86-88
A New Network Based Vulnerability Scanner
YU Yi;MAO Ming
..............page:89-90,93
Research on Network Virus Outbreak Prevention Solution
LU Ya-ling;JIANG Xing-hao;ZHAI Zhi-hua
..............page:91-93
Analysis and Design of Game Theory in Intrusion Detection System Based on Honey-pot
WANG Xiao;XUE Zhi;WANG Yi-jun
..............page:94-95,98
Study on Virus Attack in the Mobile Telephone
LIU Yi-jing;SUN Ying;LIN Yang
..............page:96-98
An Intrusion Detection Framework Based on Bimatrix Game Theory
WANG Lei;JIANG Xing-hao;ZHANG Shao-jun;LI Jian-hua
..............page:102-103,106