Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2014 Issue 11
zheng fu zhi sheng
..............page:10-10
hai wai shi ye
..............page:14-14
jing zhong chang ming
..............page:16-17
wo guo wang luo xin xi an quan zhan lue bu ju de si kao
li jing chun ;, li zhan bao ;, shi feng ;
..............page:20-26
yi mei guo wei shi jiao kan wo guo xin xi an quan zhan lue zhi ding
zuo xiao li ;, zhang li ;
..............page:27-29
yi zhan lue wei qian yin de xin xi an quan chan ye fa zhan fang lue
chen guang yong ;, qu jie ;, zhang wei ;
..............page:41-42
yi an quan wei he xin de wang luo kong jian zheng qi he zuo
zhang li ;
..............page:43-45,48
wo guo dui wei ruan fan long duan diao cha yin chu de chan ye hua ti
feng wei ;, kuang ye ;
..............page:46-48
mo rang ying jian cheng wei xin xi an quan de ying shang
chen yue hua ;, feng wei ;
..............page:49-50
po chu zhi du zuo zuo po jie chan ye yi nan
wang chuang ;
..............page:51-52
yu fa zhan guo chan cao zuo xi tong xiang guan de chan ye lian hua ti
li zhen ning ;, xiao wei dong ;
..............page:53-54
mei guo da zao zi zhu ke kong xin xi an quan chan ye lian de zhu yao ju cuo ji qi shi
wu yong ;, yu dong xing ;, zhou ji li ;
..............page:62-67
jie pu zhi hui yuan qu xin xi an quan yi ti hua jie jue fang an
xi an jiao da jie pu wang luo ke ji you xian gong si ;
..............page:68-68
qi che ji ling bu jian yan fa de xin xi an quan fang hu cuo shi
zuo zhong fang ;
..............page:69-70
jie du gao ji chi xu xing wei xie
guo nan ;
..............page:71-72
chan ye qu shi
..............page:74-74
xin pin xiu chang
..............page:75-75
tu shu tui jian
..............page:76-76
Software Vulnerability Assessment Method based on Association Analysis
PENG Wu;,WANG Dong-hai;,WEI Tao;
..............page:78-82
Entity Authentication and Replication Authentication
LI Wei-gang;,NAN Xiang-hao;
..............page:83-84,87
Bi-Directional Physical Layer-Assist Authentication in Smart-Meter System
LI Teng-fei;,MA Ting;,REN Meng-yin;,WEN Hong;
..............page:85-87
A Single Pattern Matching Algorithm for Chinese Retrieval
HAN Yun-su;,LIU Jia-yong;,OU Xian;
..............page:88-91
Security Solution for Satellite IP Network
CHEN Yu-yan;,LUO Jin;,ZHOU Bo;
..............page:92-96
JPEG2000 Secondary-Compression Detection based on LOCP Feature
HUANG Yu-lei;,LAI Jun-yao;,XU Sai-sai;,ZHOU Chao;
..............page:97-100,105
A MIMO Cross-layer Security Scheme based on STTC Deformation Code
LIAO Run-fa;,SONG Huan-huan;,TANG Jie;,WEN Hong;,XIANG Da;
..............page:101-105
Terminal Security of Mobile Finance
CHEN Xi;
..............page:106-110
Secure Information Transmission Technology and Platform Construction in Electric Power System
GUO Jia-qi;,JI Yu-tong;,LI Mu-feng;,LI Zhao-feng;,NIE Zheng-pu;,QI Yuan;
..............page:111-116
Modified Multi-Mode Matching Algorithm based on KR-BM Algorithm
LIU Jia-yong;,WU Yu-jia;,YANG Pin;
..............page:117-120
Text Security Detection Model based On Hadoop Cloud Platform
JIANG Chao-hui;,ZHAO-Kai;
..............page:121-125
Enterprise Systematic Unified Identity Management Platform
GAO Da-peng;
..............page:126-128,133
TCP Reassembling Technology based on Data Flow CharacteristicsS
LIU Jia-yong;,XIA Tian-yi;
..............page:134-136
Information Security Analysis based on AHP and Fuzzy Comprehensive Evaluation
CHEN Xin;,CHONG Xiao-lei;,LU Chao;,ZHUANG Zi-min;
..............page:137-139,143
Design and Analysis of Binary DNA Hamming Code
BAI Shan-shan;,FENG Bin;
..............page:140-143
The Multifunction Watermarking Embedding Algorithm based on MATLAB
BAI Xiao-lei;,WANG Xin-ke;
..............page:148-150