Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2013 Issue 5
HTML5's New Features and Related Security Issues
ZHANG Jian;CHEN Jian-feng;WANG Qiang
..............
page:87-89
Study iOS's Code Signing Mechanism
LU Peng;FANG Yong;FANG Fang;PU Wei
..............
page:85-86
Embedded Multi-Board System and Hot Backup System
YU Wei;GUO Bin;XIE Yong-chun;PAN Yu
..............
page:102-104
byod, ge xing hua ban gong de an quan kao yan
..............
page:20-22
Discussion on Information Encryption and Its Application
WU Chao
..............
page:93-94,97
mathworks xin ban zhu wu xian tong xin he lei da she ji geng bian li
..............
page:41
check point wei fen zhi ji gou ti gong qi ye ji an quan
..............
page:43
jiao tu ke ji jhse li bao fu wu qi an quan
..............
page:40
China Mobile's Cooperative Development of Four Networks
LUO Bin
..............
page:58-61
Study on Information Security Strategy based on P2DR2
ZHANG Tong-sheng
..............
page:90-92
app: rang ren huan xi rang ren you
..............
page:26-28
guo wu yuan xin wen ban gong shi guo jia hu lian wang xin xi ban gong shi fu zhu ren qian xiao zuo : jia qiang dui hua zeng jin hu xin gong tong ying dui wang luo an quan tiao zhan
..............
page:2-3
da shu ju ji qi an quan yan jiu
nie yuan ming
..............
page:15-16
Design and Implementation of Rapid Penetration Testing Framework
ZHANG Zhao;FANG Yong;CHEN Xing-gang
..............
page:95-97
cookie yin si shi tian pin huan shi xian zuo ?
..............
page:24-25
shou ji zhu shou zhi duo shao
..............
page:29-30
De-duplication of Encrypted Data with Proof of Ownership in Cloud Storage
JIN Xue-xue;YU Neng-hai;ZHANG Chi;SUN Chang-xiang
..............
page:66-71
dang da shu ju yu shang xin xi an quan
..............
page:12-14
xin xi dong tai
..............
page:4-5,7-8,81,84,89,92
wu shi tui jin xin xi an quan bao zhang ti xi jian she
zhan xiao su
..............
page:9-11,14
Optimization of Security Mechanism in IoT Sensing Layer
DAI Peng-wen;HE Dong;CHEN Xiao-qing
..............
page:76-78
lv meng ke ji fa bu xia yi dai fang huo qiang
..............
page:43
er wei ma jing pen zai ji an quan huo cheng ban jiao shi
..............
page:17-19
jia mi ji shu rang qi ye shu ju geng an quan
..............
page:39
Study and Design of Malware Detection Technology based on Hardware-assisted Virtualization
ZHOU Li;HU Xiao-tao;FANG Yong;LIU Liang
..............
page:79-81
fang bu sheng fang de ge ren xin xi xie lu
..............
page:31
Study on Data Portal in Public Service Corporation Field
ZHAO Hong-wei
..............
page:44-48
yong he zuo he li jie jie jue wang luo an quan wen ti
..............
page:32-33
yin du wang luo an quan jian she de zhu yao ju cuo ji qi shi ( shang )
..............
page:34-38
Security Evaluation of Mobile Intelligent Terminal System based on Graph
TANG Jie;LU Quan-ang;WEN Hong
..............
page:72-75
jia kuai xin xi an quan fa zhi bao zhang ti xi jian she yu yi shi jiao yu
zou xiang
..............
page:23
IoT Infosec Technical System
WANG Hui-bo;LI Xin;WU Bo
..............
page:98-101
Overview on Security Protocol Formal Verification Methods
XIANG Jun-long;CHEN Chuan-feng
..............
page:52-54
an quan gong yue geng yao lv yue ji zhi he chi jiu zhan
..............
page:1
Study on Desktop Virtualization based on VOI
HE Qin-lin
..............
page:49-51
Design and Implementation of Novel Power Glitch Detector
ZHAO Dong-yan;YANG Xiao-kun;YUAN Yi-dong
..............
page:62-65,71
Application of Threshold Technology in Mobile Ad-hoc Network
LI Dan;TAN Ping-zhang
..............
page:82-84
jie pu ips ying dui wang luo ru qin gong ji xin bian hua
..............
page:42
A Link Quality Prediction Algorithm for Cyber-physical Systems
WANG Zhang-jing;LUO Jun-hai
..............
page:55-57,61
wei shi tong xin xi an quan xin pin shou xiu dian zi xin xi bo lan hui
..............
page:39