Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2009 Issue 4
Hidden "Secrets" under Sunshine
WU Zhen
..............page:16
2009, What's the Potential for SMB Market
HU Xiaohe;WU Zhen
..............page:5
Research of General Dynamic Access Control Architecture Based on Multi-Decision
CHENG Jian-hao;JIANG Xing-hao;SUN Tai-feng;ZHOU Xiao-jun
..............page:44
Solutions for Trusted Access
tian rong xin gong si
..............page:39
Leadsec's Solution for IT Internal Control
lian xiang wang yu gong si
..............page:37
Rational Key Escrowing Scheme Based on Fair Diffie-Hellman Scheme
DU Heng;ZHANG Ai-xin
..............page:65
Bootloader Design and Development for Security Chip Based on M*Core
TAN Yong-wei;ZHOU Yu-jie
..............page:62
Rapid Acquisition Algorithm for UWB Signal
SUN Ning;LIU Wei-ping
..............page:59
A Scheme of IUB Flow Control based on RLC Retransfer Ratio Observation
WANG Yu;ZHANG Yuan;SHI Ji-zhao
..............page:56
Simulation and FPGA Implementation Scheme for the Broadband Anti-jamming Signal
HUANG Wen-zhun;WANG Yong-sheng;WANG Ding
..............page:53
Design of secure deception network
PAN Biao
..............page:47
The Current Status and Future Trend of Removable Storage Security Management
CHEN Shang-yi;ZHOU Bo;HUANG Yun
..............page:97
3G Brings Prospects to Infosec
ZENG Yong;SHU Yanmei
..............page:21
Security Evaluation Based On Attack Graph and Ant Algorithm
JIN Jing;SUN Dong-lai;CHEN Xiu-zhen
..............page:79
System Design of DRM Applied in the Digital Media Distribution
ZOU Yang-wen;XIONG Yun-feng;YANG Yu-hang
..............page:82
Research on DOS Attack and Defense of SIP
XU Zhen-duan;MA Jin;LU Song-nian
..............page:84
Realization and Defense of Redirection Attack on SIP
ZHOU Wen;CHEN Kai;ZHANG Yan
..............page:87