Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2016 Issue 5
shu li zheng que wang luo an quan guan li zu mei ti gong zuo jian xing xi zong shu ji jiang hua jing shen
li gang ;
..............
page:7
xin xi dong tai
..............
page:10-19,82-85
jian fu li shi shi ming jian she wang luo qiang guo
..............
page:20-29
zhong yang wang luo an quan he xin xi hua gong zuo zuo tan hui zhi qi ye da ka jie du pian
wei yang ;
..............
page:30-31
zhong yang wang luo an quan he xin xi hua gong zuo zuo tan hui zhi zhuan jia jie du pian
wu xiao zuo ;
..............
page:32-34
er shi wei zhuan jia jie du xi zong shu ji wang xin gong zuo zuo tan hui jiang hua
cui peng ;
..............
page:35-37
zhong yang wang luo an quan he xin xi hua gong zuo zuo tan hui zhao kai ying lai zhong duo wang you dian zan
zhang ran ;
..............
page:38-39
xi jin ping zhu xi wang luo an quan he xin xi hua lu jing
yuan fang ;
..............
page:40-42
xiao cheng shi da shu ju hu lian wang + shi dai di zao de xian yu jing ji fa zhan chuan qi
chen zuo ;, tao ti fu ;
..............
page:43-53
da zao zhi hui chong zhou zhu meng xian dai hua cheng shi zhuan fang chong zhou shi wei shu ji zhao hao yu
tao ti fu ;
..............
page:54-61
hei zuo shen xian xie mi feng bo dao di shu dui shu cuo ?
qi yue ;
..............
page:62-63
ou meng zhong ji ban shu ju bao hu fa an jiang sheng xiao
an sheng ;
..............
page:64-65
gong min ge ren yin si gai ru he bao hu ?
chulong;
..............
page:66-67
guo wai duo jia yi liao ji gou zao dao le suo ruan jian gong ji
mu xu ;
..............
page:68-69
jue bu zhi huai nian nuo ji ya yong you de huan you hen duo
wu xiao zuo ;
..............
page:70-71
ri ben pin fan qiang hua wang luo bu dui huo bu jin wei dong jing ao yun an bao
wu xiao zuo ;
..............
page:72-73
mei xin xi bao zhan sheng ji huo cu guo hui you suo zuo wei
cui peng ;
..............
page:74-75
ping guo shou shang zhi hou , gu ge ye wei neng du shan qi shen
zhang ran ;
..............
page:76-77
2016 nian 4.29 shou du wang luo an quan ri wang luo yu xin xi an quan bo lan hui kai mu
qi yue ;
..............
page:78-79
wo guo shou ben xin xi an quan lan pi shu ji jiang bian zhuan fa xing
zuo xin ;
..............
page:80
you zuo zuo 16.04 ban ben huo re deng chang
zheng an ;
..............
page:81
tong you ke ji bei ping wei shu ju zhong xin jie jue fang an you xiu gong ying shang
zheng an ;
..............
page:81
li shu shi jie shi da chao ji lao pai hei ke
zheng xiao xiao ;
..............
page:86-87
qing huai bu jian tan xun bei jing cheng li de ming ren gu ju
zheng xiao xiao ;
..............
page:88-89
Application of Websocket in InfoSec System
LIU Dong;,HUANG Bin;,WANG Feng;,TANG Zhong-qian;
..............
page:92-94
Overview of InfoSec Vulnerability in Year 2015
LU Gang;,MI Shi-chao;,GUO Rong-hua;
..............
page:95-99
Security Analysis for WIFI Hotspots and PSK
ZHANG Jia;,CHENG Cui-shen;,ZHENG Hui;
..............
page:100-103
Security Access Authentication for Distributed Control System
WANG Wei-jian;,LU Yue;,CHEN Chang-song;,CHEN Xiu-zhen;
..............
page:104-106,110
A MIMO Cross-layer Secure Communication Scheme based on Spatial Modulation
ZHANG Zheng-guang;,XIANG Da;,ZHANG Jin-ling;,WEN Hong;
..............
page:107-110
Performance Analysis of Multi-Antenna Physical Layer Security Transmission System
ZHANG Lu-ping;,SONG Huan-huan;,TANG Jie;,DONG Wei-hua;,WEN Hong;
..............
page:111-113
Application Architecture of Cryptography in Cloud Computing
YI Tao;
..............
page:114-116