Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2012 Issue 3
Study on Trustworthy Cloud Services
zhao fei ; wang qiang
..............
page:84-86,89
Analysis of Redundancy Technology for Industrial Ethernet
xiao he ; guan hai bing ; huan fei
..............
page:59-63,67
qian tan jie pu wang luo cui ruo xing zhi neng ping gu xi tong
..............
page:50-51
Research of Video Forgery Blind Detection
tan mao zhou ; jiang xing hao ; sun zuo feng
..............
page:68-69
jing ti jiang shi wang luo kan hao qi ye wang luo hou men
bai su
..............
page:47-48
2012 hui yi qiang xian bao
wu
..............
page:4-5
hong mu acer shang yong ji re xiao chan pin xin chun da pan dian
..............
page:53-53
Design and Construction of Proactive Defense System for CSR Corporation Cyberspace
du lin ming ; you long ; tang liang
..............
page:54-56
hua bei you tian xie shou ming chao wan da gou jian yi dong ban gong an quan xin ti xi
..............
page:52-52
nfc yi jin an quan cheng wei ying yong jiao dian
bai jie
..............
page:30-32
yi sai tong shu ju xie lu fang hu shi chang zhan you lv lian xu si nian di yi
..............
page:6-6
Data Self-destruction Technology based on Two P2P Protocols
zhang de zhi ; he en
..............
page:87-89
Anti-sybil Attack System based on Social Network Trust Weight
liu feng ; fan lei
..............
page:78-81
gong xin bu fa bu wu lian wang shi er wu fa zhan gui hua
..............
page:3-3
xin shi dai xia xin xi an quan qi ye de a ka liu si zhi zuo
..............
page:1-1
cong dian ying die zhong die 4 kan xin xi an quan fang hu qu shi
jin jin
..............
page:28-29
Credit Model based on P2P Electronic Cash System Bitcoin
zheng shu zuo ; fan lei
..............
page:72-75
tong xin ji shu zheng gao qi shi
..............
page:56-56
A Motion Object Recognition Algorithm Using Multi-Features Fusion
tang feng ; jiang xing hao ; sun zuo feng ; lu huan
..............
page:57-58
sai men tie ke duan dian fang hu ping tai wei lie gartner mo li xiang xian ling dao zhe di wei
..............
page:6-6
A Survey on Reversible Video Data Hiding Algorithm
lu huan ; jiang xing hao ; sun zuo feng ; tang feng
..............
page:82-83
isccc zu zhi zhao kai fa zhan zhan lue yan tao hui
..............
page:6-6
gong ye he xin xi hua bu xin xi an quan xie diao si si chang zhao ze liang ji ji ying dui feng xian tiao zhan wei hu guo jia xin xi an quan
..............
page:2-2
jie de wei ao da li ya lian bang yin xing ti gong tsm zheng ti jie jue fang an
..............
page:89-89
hai tai fang yuan zhong biao gui zhou sheng di shui ju an quan zi xun fu wu xiang mu
..............
page:6-6
yun dian shi fa zhan qu shi yu an quan tan tao
hu xiao he
..............
page:33-34
di 22 jie quan guo xin xi bao mi xue shu hui yi zheng wen tong zhi
..............
page:94-94
wei bo shi ming liao an quan huan hui yuan ma
jun jun
..............
page:37-38
xin xi an quan re dian tan tao gong ye kong zhi xi tong an quan
..............
page:9-14
gong ye kong zhi xi tong an quan feng xian fen xi
zhang shuai
..............
page:15-19
ni guang nan zhong guo yun ji suan jiang da zao zi zhu chan ye lian
zhou xue
..............
page:7-8
hei ke jing shen yu zi you bian qian
wang he ming
..............
page:41-42
apt gong ji qiao ran lai xi qi ye xin xi mian lin jing zhun da ji
liu zuo zuo
..............
page:39-40
shu guang cheng shi yun ji suan zhong xin luo hu chang chun
..............
page:46-46
shou ji dian shi wu xu tian xian shi xian yi dong zhi fu zhi xu huan ka guo min ji shu liang xiang iic china zhan xian xin ji shu
..............
page:43-43
san da ju cuo gao bie xie mi men
..............
page:44-44
bo ke zai 2012 nian yun lian meng zhan hui shang zhan shi qi guang xian wang luo jie jue fang an
..............
page:6-6
Video Filter Algorithm based on Color Feature and Skin Detection
zuo ren ze ; jiang xing hao ; sun zuo feng
..............
page:70-71,75
360 chan pin xia jia tu xian an quan shi chang bi duan
ji yu
..............
page:35-36
Video Filtration for Content Security based on Multimodal Features
jiang cheng ming ; jiang xing hao ; sun zuo feng
..............
page:76-77
Risk Analysis and Management Strategy for University Research Confidentiality
pan zuo ; chen yang lin ; guo jian ; wei hai yan
..............
page:64-67
lv shu wang jiao shou tan zhi shi an quan yu wei lai wang luo
zhou xue
..............
page:20-21
lv meng ke ji nips yu waf chan pin zai huo 2011 nian du chan pin jiang
..............
page:81-81
zhong guo mi ma xue hui 2012 nian hui zheng wen tong zhi
..............
page:94-94
jia neng kan hao zhong guo guo nei an fang shi chang
bai jie
..............
page:48-48
A Distributed File System for Safe Documents Storage
chen dong yu ; hao guang zuo ; ou yang hao zhe ; zuo xiao rong
..............
page:90-93
da liang wang zhan yong hu zi liao xie mi tian xian shen ji qiao zhua xian xing
peng zuo zuo
..............
page:45-46
cpk kang qiong ju gong ji de dui ce
nan xiang hao
..............
page:22-23
zhong duan an quan nei wang an quan qi an quan wei lai shui shi zhu liu
hu xiao he ; wang he ming
..............
page:24-27,29
wang yu xing yun an quan chan pin zu he quan xing ye ying yong dian xing an li
..............
page:49-49,51
fei tian cheng xin xie shou ying te er zhu tui ipt
..............
page:6-6