Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2015 Issue 7
2015 nian xin xi an quan zheng zai jing li qian suo wei you de da bian ge
wang wen sheng ;
..............
page:6-7
xin xi dong tai
..............
page:10-12,16-17,65-68
wang luo kong jian an quan guo jia yi ji xue ke zheng shi huo pi / wo guo ni ding wang luo an quan fa wei hu wang luo kong jian zhu quan /idc yu ce : wei lai wu nian zhong guo xin xi an quan chan ye zeng chang lv jiang jin 17
..............
page:13
zhong guo wang an xie shou wei shi tong jing xin da zao 6+1 an quan he wu qi
..............
page:14-15
lu zuo : pei yu hao wang min gong zhu an quan wang
hu xiao he ;, he zuo ;
..............
page:18-21
tu wen gong hua wang luo an quan zhou
hu xiao he ;, he zuo ;
..............
page:21-25
qi ge zhu ti ri nei rong yan xi feng fu
hu xiao he ;, he zuo ;
..............
page:26-27
ying guo bao hu qing shao nian shang wang an quan de zhu yao zuo fa ji qi shi
zhou ji li ;, li jia yun ;, wei cui hong ;
..............
page:28-33
hu lian wang + fa zhan lang chao dui wei lai cheng shi an quan ying xiang yan jiu
men xiao jun ;, hui zhi bin ;
..............
page:34-42
hu lian wang + bei jing xia cheng shi gong gong fu wu fa zhan qu shi ji qi feng xian chu tan
zhang xiao ;
..............
page:43-44
zai hu lian wang + de da ge ju xia fa zhan da shu ju an quan chan ye
qin an ;
..............
page:45-47
an quan chuang ye ying jian li jing zheng bi lei shi chuang xin bei ji guang feng xian tou zi ji jin dong shi zong jing li deng feng tan wang luo an quan chuang tou si kao
cheng ling ;
..............
page:48-49
wang luo qiang guo zhan lue gui hua yao dian tan xi
wang zhi ;
..............
page:50-52
wang luo an quan biao zhun ti xi yan jiu
yao xiang zhen ;, zhou zuo kang ;, fan ke feng ;
..............
page:53-56
xin xi an quan fu wu ti xi jian she yao dian yan jiu xin xi an quan fu wu ti xi yan jiu zhi si
liu jing ;, luo zuo ;, jiang lei ;
..............
page:57-59
an quan chan ye li ying cheng wei bao zhang wang luo xin xi an quan de zhong jian li liang
fei xian zhi ;
..............
page:61-62
ru he jia qiang p2p wang luo jie dai ping tai shu ju de an quan xing
..............
page:63-64
A Reasonable Detection Model for Privacy Permission based on Android Applications
HUANG Jun-qiang;,YU Hong-jun;
..............
page:70-73,80
Key Technology of Quantum and Classical Fusion Secure Communication
GUO Bang-hong;,ZHANG Wen-jie;,GUO Jian-jun;,FAN Rong-hua;
..............
page:74-80
Criteria and Process for Maliciousness Malevolence and Risk of Mobile Application
JIANG Yong-cheng;,HUA Cun-qing;
..............
page:81-85
Continuous Variable Quantum Private Communication Technology
WANG Huai-sheng;,YANG Jie;
..............
page:86-91
Information Security and Handling Strategy for Transportation Industry
YIN Lin;
..............
page:92-94,98
Offense-and-Defense Experimental Platform based on Virtualization and Industrialization
ZHU Xi;,ZHANG Li-shou;
..............
page:95-98