Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2010 Issue 7
Design of Complex Communication Network Based on Simulation
guo bin ; tan qi
..............page:49-51
Population-based Co-stimulation Artificial Immune Model
wu ze jun ; an hui yao ; wang xiu yun ; wang xin an
..............page:90-93
A Secure Authentication Scheme with Anonymity and Unlinkability for Wireless Communications
zhou tian tong ; wu teng ; li xiang xue ; xu shu min
..............page:78-80
Unified Management of Network Security Devices
liu peng ; ma lin ; lian xin ke
..............page:66-68
Hierarchical Model of Network Access Control
zhao zhang jie
..............page:84-86
News In Brief
..............page:9,68,86,102
Data Leakage Prevention System Based on Virtual Application
tian qiang ; liu bao xu ; zhang xiang ling
..............page:74-77
Application Of BCH Coding In GPS Sonde
wang yu
..............page:45-46
Study and Optimization of EPZS Algorithm
tian xiu hua ; liu qing li
..............page:42-44
Industry Events
..............page:5-6
Standardized Processing Based on Network Data
liang jia zheng ; xue zhi
..............page:47-48,51
Application of Threshold Technology in Multicast Key Management
zhou yong heng ; di jian hong ; zhang hong li ; yang ru
..............page:87-89,93
Credible Digital Data Message System
sun hong bin
..............page:72-73,77
China Internet Situation
..............page:2-4
Principle and Realization of DDC Based on ISL5416
liu hong he ; cheng zuo ; jia ke xin ; he zi shu
..............page:54-56
Questions & Answers in Web Security(1)
..............page:23-24
Integrity Measurement Based on Dependence Relationship of Entity Behaviors
li rui hua ; li chen ; zhuang ; jiang min hui
..............page:94-98
A New Steganographic Algorithm of Pixel Indicator Split Blocks
a bu du re xi ti hai mi ti
..............page:60-62
Modified CPW-fed Monopole Antenna for Dual-band Application
wang guo chao ; xu jia dong
..............page:35-37,41
Quantum Convert Communication Protocol Based on Redundant Information
gong yan jun ; wen xiao jun ; ji li ping ; niu xia mu
..............page:38-41
Trusted Computing Based on Virtual Machine
han chun lin ; shu bin
..............page:81-83
Jump\'s New-generation Solution for SSL VPN Product
he jian feng
..............page:31-32
Slot Clock Recovery and Demodulation in Optical Wireless PPWM Communication System
yuan zuo jie ; fan yang yu ; bai bo
..............page:52-53,56