Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2015 Issue 7
xin xi dong tai
..............page:10-12,16-17,65-68
lu zuo : pei yu hao wang min gong zhu an quan wang
hu xiao he ;, he zuo ;
..............page:18-21
tu wen gong hua wang luo an quan zhou
hu xiao he ;, he zuo ;
..............page:21-25
qi ge zhu ti ri nei rong yan xi feng fu
hu xiao he ;, he zuo ;
..............page:26-27
ying guo bao hu qing shao nian shang wang an quan de zhu yao zuo fa ji qi shi
zhou ji li ;, li jia yun ;, wei cui hong ;
..............page:28-33
wang luo qiang guo zhan lue gui hua yao dian tan xi
wang zhi ;
..............page:50-52
wang luo an quan biao zhun ti xi yan jiu
yao xiang zhen ;, zhou zuo kang ;, fan ke feng ;
..............page:53-56
A Reasonable Detection Model for Privacy Permission based on Android Applications
HUANG Jun-qiang;,YU Hong-jun;
..............page:70-73,80
Key Technology of Quantum and Classical Fusion Secure Communication
GUO Bang-hong;,ZHANG Wen-jie;,GUO Jian-jun;,FAN Rong-hua;
..............page:74-80
Criteria and Process for Maliciousness Malevolence and Risk of Mobile Application
JIANG Yong-cheng;,HUA Cun-qing;
..............page:81-85
Continuous Variable Quantum Private Communication Technology
WANG Huai-sheng;,YANG Jie;
..............page:86-91