Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2010 Issue 7
Design of Complex Communication Network Based on Simulation
guo bin ; tan qi
..............
page:49-51
Population-based Co-stimulation Artificial Immune Model
wu ze jun ; an hui yao ; wang xiu yun ; wang xin an
..............
page:90-93
A Secure Authentication Scheme with Anonymity and Unlinkability for Wireless Communications
zhou tian tong ; wu teng ; li xiang xue ; xu shu min
..............
page:78-80
Unified Management of Network Security Devices
liu peng ; ma lin ; lian xin ke
..............
page:66-68
Real-time Intrusion Detection System Based on Network Traffic
li xuan
..............
page:63-65
Computer Forensic\'s Vital Legal Status
..............
page:7-9
Hierarchical Model of Network Access Control
zhao zhang jie
..............
page:84-86
Grand FIFA "World Cup" Feast with Security as Its "Goal-Keeper"
..............
page:20-21
News In Brief
..............
page:9,68,86,102
Data Leakage Prevention System Based on Virtual Application
tian qiang ; liu bao xu ; zhang xiang ling
..............
page:74-77
ID-Based Proxy Signature Scheme with Efficient Proxy Revocation
ru peng
..............
page:69-71
Application Of BCH Coding In GPS Sonde
wang yu
..............
page:45-46
Study and Optimization of EPZS Algorithm
tian xiu hua ; liu qing li
..............
page:42-44
Industry Events
..............
page:5-6
Discussion on Necessity of Professional Training for Infosec Hierarchical Protection
li chao
..............
page:25
Frame Computing,Complex Module Behind the Miracle
..............
page:16-17
The Security Opportunity Is Ubiquitous
..............
page:1
Standardized Processing Based on Network Data
liang jia zheng ; xue zhi
..............
page:47-48,51
Electrical-appliance Retail Trade Strengthening Internal Control and Promoting Information Security
..............
page:10-11,13
Application of Threshold Technology in Multicast Key Management
zhou yong heng ; di jian hong ; zhang hong li ; yang ru
..............
page:87-89,93
Credible Digital Data Message System
sun hong bin
..............
page:72-73,77
Hongsi Electronics, Unknown-to-the-Public Cultivator in Infosec Chip Field
..............
page:26-27
Next Generation SIM Card of High Speed and Mega-bit Storage
pu ruo zuo
..............
page:57-59
Multi-function,Super-practicability,Strong Supervision——Comments on Westone\'s New Product USG 3000 Series
..............
page:22
China Internet Situation
..............
page:2-4
With Mergers and Acquisition of Security Enterprises Intensified the Industry Link will Usher in Its Qualitative Changes
..............
page:14-15
Principle and Realization of DDC Based on ISL5416
liu hong he ; cheng zuo ; jia ke xin ; he zi shu
..............
page:54-56
Real-time Supervision of Involved Secret with No Anxiety of Security——TIPTOP Supervision System fur Breach-of-regulations Treatment of Secret-involved Documents
..............
page:34
Private Network Attack Is By No Means Inferior to Network War in Implication
li hong
..............
page:12-13
Questions & Answers in Web Security(1)
..............
page:23-24
Observe the Development of Infosec Industry from the Breakthrough of 104 mb/s for UTM
ren ping
..............
page:18-19
Integrity Measurement Based on Dependence Relationship of Entity Behaviors
li rui hua ; li chen ; zhuang ; jiang min hui
..............
page:94-98
New Hacker Age Arrives, We Are Ready and Waiting——How to Do Well the Infosec Assurance under New Situation
..............
page:28-29
A New Steganographic Algorithm of Pixel Indicator Split Blocks
a bu du re xi ti hai mi ti
..............
page:60-62
Service Security Defense-line for Electrical System Should Be Enhanced Both in Length and Breadth
zuo wen jing
..............
page:33
China\'s Largest Infosec Industry Base Founded——Contract-Signing Ceremony of Tianjin National Infosec Industry Base Solemnly Held
..............
page:30
Modified CPW-fed Monopole Antenna for Dual-band Application
wang guo chao ; xu jia dong
..............
page:35-37,41
Quantum Convert Communication Protocol Based on Redundant Information
gong yan jun ; wen xiao jun ; ji li ping ; niu xia mu
..............
page:38-41
Trusted Computing Based on Virtual Machine
han chun lin ; shu bin
..............
page:81-83
Study on Application of Network-fingerprint Analysis Technique in Criminal Reconnaissance
hu xiao bo
..............
page:99-102
Jump\'s New-generation Solution for SSL VPN Product
he jian feng
..............
page:31-32
Slot Clock Recovery and Demodulation in Optical Wireless PPWM Communication System
yuan zuo jie ; fan yang yu ; bai bo
..............
page:52-53,56