Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2011 Issue 12
Study on HTTPS Tunneling Trojan with Anonymous Diffie-Hellman Protocol
liu chao ; wang zuo jun ; shi yong
..............page:78-80
Private Information Retrieval under Multi-server Environment
chen yang yang ; huang zheng ; xu li li
..............page:100-102
City safety information safety system design
liu zeng qi
..............page:89-91
A Generation Algorithm of Privilege Escalation Graph
li zuo ; zhang bao wen
..............page:92-94
Study on Development of US Military GIG3.0
zeng meng zuo ; tan ping zuo ; chen jian feng
..............page:50-53
jie pu zhu li yun ying shang web ying yong quan mian an quan
cheng yun peng
..............page:41-41
ZUC Algorithm: 3GPP LTE International Encryption Standard
feng xiu tao
..............page:45-46
hou pc ying yong shi dai de chan ye yu an quan si kao
hu xiao he
..............page:21-23,26
System Effectiveness Evaluation based on Grey Decision Theory
zhang jiang ; wei tao
..............page:60-62
Improved SMO Text Classification Algorithm
wang xin xin ; lai hui cheng
..............page:63-64,67
A Mixed Anonymous System based on Tor
zheng guang ; xue zhi
..............page:76-77,80
Study on Encryption Technique for WDM System
liu jian jiang ; li ying
..............page:83-85
Risk Assessment Method based on Hidden Markov Model
li zuo yan ; wang qing xian ; yang lin ; zhu yun
..............page:68-70
Study on Document Transmission Characteristics of Fetion and Its File Recovery
zhou fei long ; liu jia yong
..............page:57-59
Study on ECC High-speed Algorithm in 3G Video Conference System
wu song yang ; wu hai ying ; lu chen
..............page:95-96
ying yong jue ding shi chang chuan tong pc gao ji
bei zuo
..............page:30-32
Study on Covert Channel based on the DNS Protocol
gu chuan zheng ; wang zuo jun ; xue zhi
..............page:81-82,85
Construction of Enterprise Network Security System
wang yong jun ; li jian qing
..............page:86-88,91
hui yi qiang xian bao
..............page:5-5
nian mo wang luo zha pian qi zong zui
ji yu
..............page:29-29
wlan lan hai yu wei ji bing cun
yan wei chuan
..............page:24-26
ru he gou jian shu ju fang xie mi an quan ti xi
yu bo
..............page:40-40
Secure File System for Centralized Storage
zhou ying hong
..............page:71-72,75
she jiao wang luo shi dai an quan huan xin zhuang
zhou xue
..............page:27-28
wei lai xin shi jie
..............page:1-1
fa xian rsa da hui de san da mi yue
bai jie
..............page:7-12
Study on Power Allocation for Multi-relay AF Cooperative System
xu yi biao ; zhang hui sheng ; li li xin
..............page:65-67
Hidden File Transfer Tunnel based on Oracle Undetectable Backdoor
jiang yan ; wang zuo jun ; xue zhi
..............page:73-75
nuo dun yun an quan shi wei lai
..............page:53-53