Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2013 Issue 9
dell sonicwall: zhong guo qu zhang men xin tiao zhan
..............
page:43
OSPF Implementation Technology with Multi-Dimensional QoS Guarantee
WU Jie
..............
page:60-62
chuan tong an quan chan pin ru he ying dui gao ji chi xu xing wei xie
..............
page:41
Discussion on Autonomous Construction and Management of Cyberspace
DONG Shu-ying;CHEN Li-yun;GAO Xiu-feng
..............
page:47-52
xiao qi lian he , gong yi xian xing , kai chuang ren cai pei yang xin tu jing wei shi tong du jia zhi chi di liu jie quan guo da xue sheng xin xi an quan jing sai
..............
page:40
gong xin bu kai zhan fang fan zhi li hei ke di xia chan ye lian zhuan xiang xing dong
..............
page:3-4
Design of Online Authentication System based on USBKey
LIAO Yun;ZHOU An-min
..............
page:81-83
Application of S box in FPGA based on Boolean Function
WANG Song;HAN Lian-bing;DUAN Jun-hong
..............
page:90-91
Fast Implementation of Prime-Field Modular Multiplication based on FPGA
HAN Lian-bing;HUANG Rui;DUAN Jun-hong;WANG Song;FANG Li-guo
..............
page:76-78
yi dong hu lian wang de xin lan hai
..............
page:38-39
Cloud-Oriented Data Security Solution
YIN Jian-lin;CHEN Wang-jian;BI Yong-zheng
..............
page:95-97
liang zi yu mi ma de qiao ran peng zhuang zhuan fang zhong guo ke xue ji shu da xue han zheng fu jiao shou
..............
page:21-25
Tampered-Image Detection
GENG Zhen-min;ZHU Dan
..............
page:55-59
Trusted-Access Control Technology based on TNC
PANG Fei;LENG Bing;TAN Ping-zhang;ZHOU Lian-song
..............
page:84-86,89
Etymological research on Cyberspace, Analyze the research and development of Cyberspace
YANG Ming
..............
page:92-94,97
xin xi dong tai
..............
page:5-9,46,封3
da shu ju : huan 3g shang wang yi ben ming bai zhang
ying te er gong si
..............
page:42
gong ye he xin xi hua bu fu bu chang shang bing : quan li bao zhang wang luo yu xin xi an quan
..............
page:2
Information Security based on Cloud Computing
zhang xian long ; nie tong tong
..............
page:68-72
Design of Security Framework of Mobile Communication Network Application
HU Jin-shan;CHEN Qing-rong;YE Qing
..............
page:106-108
gong ye kong zhi xi tong xin xi an quan kua jie de gong shi he xing dong
..............
page:1
Discussion on Data Security Aroused by Prism
CHEN Hui;WANG Su-ling
..............
page:44-46
xin jia po xin xi an quan xing shi yu zhu yao jian she ju cuo tan xi
..............
page:30-37
Design and Realization of PKCS#11Resource-Sharing
FANG Li-guo;DAI Xia;XIE Yong-liang;FU Guo-kai;WU Kai-jun
..............
page:79-80,83
Operating System Recognition based on Singular Value Decomposition and DAG_SVMS
CHENG Shu-bao;HU Yong
..............
page:66-67,72
Classified Protection Framework For Cloud Computing System
ZHANG Jing-hai;ZHANG Bao-wen;YANG Bing;LI Hao
..............
page:98-105
Risk Modeling of Commercial Bank Information Systems Development
GAO Song;JIAN Fan;WANG Yan;CAO Yu-lei;CHEN Chu-Xin
..............
page:63-65
Design of Elevator Safety System based on Airbags
GUO Jin;WU Qi-zhou;REN Yan;LIU Hao;PENG Hui-dong
..............
page:53-54,59
2013 gong ye kong zhi xi tong ying an quan da kao
..............
page:10-20
PKCS#11 Crypto Token Interface-level Model based on Dynamic Link
DIA Xia;FANG Li-guo
..............
page:87-89
Desktop Cloud and Security Design
JIN Xiao-gang;LIU Hong-bo
..............
page:73-75,78
qian tan yun ji suan an quan yu guan li biao zhun zhuan fang si chuan da xue ji suan ji xue yuan wang luo yu ke xin ji suan yan jiu suo suo chang chen xing shu jiao shou
..............
page:26-29