Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2012 Issue 3
Study on Trustworthy Cloud Services
zhao fei ; wang qiang
..............page:84-86,89
Analysis of Redundancy Technology for Industrial Ethernet
xiao he ; guan hai bing ; huan fei
..............page:59-63,67
Research of Video Forgery Blind Detection
tan mao zhou ; jiang xing hao ; sun zuo feng
..............page:68-69
2012 hui yi qiang xian bao
wu
..............page:4-5
Design and Construction of Proactive Defense System for CSR Corporation Cyberspace
du lin ming ; you long ; tang liang
..............page:54-56
nfc yi jin an quan cheng wei ying yong jiao dian
bai jie
..............page:30-32
Data Self-destruction Technology based on Two P2P Protocols
zhang de zhi ; he en
..............page:87-89
Anti-sybil Attack System based on Social Network Trust Weight
liu feng ; fan lei
..............page:78-81
Credit Model based on P2P Electronic Cash System Bitcoin
zheng shu zuo ; fan lei
..............page:72-75
tong xin ji shu zheng gao qi shi
..............page:56-56
A Motion Object Recognition Algorithm Using Multi-Features Fusion
tang feng ; jiang xing hao ; sun zuo feng ; lu huan
..............page:57-58
A Survey on Reversible Video Data Hiding Algorithm
lu huan ; jiang xing hao ; sun zuo feng ; tang feng
..............page:82-83
yun dian shi fa zhan qu shi yu an quan tan tao
hu xiao he
..............page:33-34
wei bo shi ming liao an quan huan hui yuan ma
jun jun
..............page:37-38
gong ye kong zhi xi tong an quan feng xian fen xi
zhang shuai
..............page:15-19
hei ke jing shen yu zi you bian qian
wang he ming
..............page:41-42
san da ju cuo gao bie xie mi men
..............page:44-44
Video Filter Algorithm based on Color Feature and Skin Detection
zuo ren ze ; jiang xing hao ; sun zuo feng
..............page:70-71,75
Video Filtration for Content Security based on Multimodal Features
jiang cheng ming ; jiang xing hao ; sun zuo feng
..............page:76-77
Risk Analysis and Management Strategy for University Research Confidentiality
pan zuo ; chen yang lin ; guo jian ; wei hai yan
..............page:64-67
A Distributed File System for Safe Documents Storage
chen dong yu ; hao guang zuo ; ou yang hao zhe ; zuo xiao rong
..............page:90-93
cpk kang qiong ju gong ji de dui ce
nan xiang hao
..............page:22-23
zhong duan an quan nei wang an quan qi an quan wei lai shui shi zhu liu
hu xiao he ; wang he ming
..............page:24-27,29