Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2013 Issue 5
HTML5's New Features and Related Security Issues
ZHANG Jian;CHEN Jian-feng;WANG Qiang
..............page:87-89
Study iOS's Code Signing Mechanism
LU Peng;FANG Yong;FANG Fang;PU Wei
..............page:85-86
Embedded Multi-Board System and Hot Backup System
YU Wei;GUO Bin;XIE Yong-chun;PAN Yu
..............page:102-104
Discussion on Information Encryption and Its Application
WU Chao
..............page:93-94,97
Study on Information Security Strategy based on P2DR2
ZHANG Tong-sheng
..............page:90-92
app: rang ren huan xi rang ren you
..............page:26-28
da shu ju ji qi an quan yan jiu
nie yuan ming
..............page:15-16
Design and Implementation of Rapid Penetration Testing Framework
ZHANG Zhao;FANG Yong;CHEN Xing-gang
..............page:95-97
shou ji zhu shou zhi duo shao
..............page:29-30
De-duplication of Encrypted Data with Proof of Ownership in Cloud Storage
JIN Xue-xue;YU Neng-hai;ZHANG Chi;SUN Chang-xiang
..............page:66-71
dang da shu ju yu shang xin xi an quan
..............page:12-14
xin xi dong tai
..............page:4-5,7-8,81,84,89,92
wu shi tui jin xin xi an quan bao zhang ti xi jian she
zhan xiao su
..............page:9-11,14
Optimization of Security Mechanism in IoT Sensing Layer
DAI Peng-wen;HE Dong;CHEN Xiao-qing
..............page:76-78
Study and Design of Malware Detection Technology based on Hardware-assisted Virtualization
ZHOU Li;HU Xiao-tao;FANG Yong;LIU Liang
..............page:79-81
Study on Data Portal in Public Service Corporation Field
ZHAO Hong-wei
..............page:44-48
Security Evaluation of Mobile Intelligent Terminal System based on Graph
TANG Jie;LU Quan-ang;WEN Hong
..............page:72-75
IoT Infosec Technical System
WANG Hui-bo;LI Xin;WU Bo
..............page:98-101
Overview on Security Protocol Formal Verification Methods
XIANG Jun-long;CHEN Chuan-feng
..............page:52-54
Study on Desktop Virtualization based on VOI
HE Qin-lin
..............page:49-51
Design and Implementation of Novel Power Glitch Detector
ZHAO Dong-yan;YANG Xiao-kun;YUAN Yi-dong
..............page:62-65,71
Application of Threshold Technology in Mobile Ad-hoc Network
LI Dan;TAN Ping-zhang
..............page:82-84
A Link Quality Prediction Algorithm for Cyber-physical Systems
WANG Zhang-jing;LUO Jun-hai
..............page:55-57,61