keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [“Internet Plus” Mobile Power: Analysis the Network Security of ZTE] 2016 Vol.2(4):288-298
[Abstract] ( 655 ) [HTML 0 KB][PDF 1637 KB] (439)
2 [Time Machine Forensic] 2016 Vol.2(4):307-316
[Abstract] ( 522 ) [HTML 0 KB][PDF 5953 KB] (250)
3 [Overview on SM9 Identity Based Cryptographic Algorithm] 2016 Vol.2(11):1008-1027
[Abstract] ( 522 ) [HTML 0 KB][PDF 13949 KB] (975)
4 [Overview of Electronic Data Forensics Technology] 2016 Vol.2(4):299-306
[Abstract] ( 386 ) [HTML 0 KB][PDF 5966 KB] (298)
5 [An Overview of Hadoop Security Framework] 2016 Vol.2(8):684-698
[Abstract] ( 379 ) [HTML 0 KB][PDF 12399 KB] (173)
6 [Research on Data Reading Technology of Android Smart Phone Based on eMMC] 2016 Vol.2(4):317-323
[Abstract] ( 354 ) [HTML 0 KB][PDF 5047 KB] (262)
7 [ Research on The Technology Architecture of Big Data Security and Privacy System] 2016 Vol.2(3):244-250
Lv Xin [Abstract] ( 334 ) [HTML 0 KB][PDF 6172 KB] (437)
8 [Security Architecture and Key Technologies of Blockchain] 2016 Vol.2(12):1090-1097
Yan Zhu [Abstract] ( 289 ) [HTML 0 KB][PDF 6838 KB] (297)
9 [A Survey of Fingerprint Recognition Technology] 2016 Vol.2(4):343-355
[Abstract] ( 275 ) [HTML 0 KB][PDF 10838 KB] (172)
10 [An Analytical Method of Mobile Phone Packet Capture Based on Android System] 2016 Vol.2(4):339-342
[Abstract] ( 248 ) [HTML 0 KB][PDF 2945 KB] (175)
11 [“Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background] 2016 Vol.2(5):384-395
[Abstract] ( 233 ) [HTML 0 KB][PDF 1491 KB] (620)
12 [Research and Progress of the Cyber Security Standardization of Smart City] 2016 Vol.2(5):442-446
[Abstract] ( 229 ) [HTML 0 KB][PDF 4021 KB] (241)
13 [Research and Vulnerability Prevention of Information Gathering in Penetration Test] 2016 Vol.2(3):211-219
[Abstract] ( 226 ) [HTML 0 KB][PDF 7566 KB] (196)
14 [A Fully Homomorphic Encryption Scheme Based LWE] 2016 Vol.2(3):220-224
[Abstract] ( 218 ) [HTML 0 KB][PDF 3693 KB] (351)
15 [Study on Release Risks and Protecting Strategies of Privacy During Government's Open Data] 2016 Vol.2(9):792-801
[Abstract] ( 215 ) [HTML 0 KB][PDF 8054 KB] (99)
16 [The Improvement and Instance Analysis of the Formal Verification Tool Scyther] 2016 Vol.2(3):272-279
Xu Han [Abstract] ( 214 ) [HTML 0 KB][PDF 6016 KB] (318)
17 [Development of Authenticated Encryption] 2016 Vol.2(10):876-882
[Abstract] ( 209 ) [HTML 0 KB][PDF 5382 KB] (274)
18 [SM3 Cryptographic Hash Algorithm] 2016 Vol.2(11):983-994
[Abstract] ( 207 ) [HTML 0 KB][PDF 8502 KB] (264)
19 [Overview on SM4 Algorithm] 2016 Vol.2(11):995-1007
[Abstract] ( 207 ) [HTML 0 KB][PDF 8653 KB] (246)
20 [Research and Implementation of Access Control Method for Big Data Platform] 2016 Vol.2(10):926-930
[Abstract] ( 205 ) [HTML 0 KB][PDF 4271 KB] (152)
21 [A Review on Image Reversible Data Hiding] 2016 Vol.2(8):729-734
[Abstract] ( 203 ) [HTML 0 KB][PDF 5707 KB] (366)
22 [Quantum Random Number Generation] 2017 Vol.3(1):23-35
[Abstract] ( 201 ) [HTML 0 KB][PDF 11007 KB] (75)
23 [Meiya Pico,Innovation to Enhance the Core Technology of Cybersecurity] 2017 Vol.3(9):770-780
[Abstract] ( 201 ) [HTML 0 KB][PDF 1952 KB] (69)
24 [The ZUC Stream Cipher Algorithm] 2016 Vol.2(11):1028-1041
[Abstract] ( 199 ) [HTML 0 KB][PDF 7769 KB] (192)
25 [Formal Verification Method of Smart Contract] 2016 Vol.2(12):1080-1089
[Abstract] ( 198 ) [HTML 0 KB][PDF 7621 KB] (178)
26 [The Present Situation and Thought of Cloud Computing Security Standards at Home and Abroad] 2016 Vol.2(5):424-428
[Abstract] ( 193 ) [HTML 0 KB][PDF 4332 KB] (309)
27 [Analysis and Enlightenment of American Cyber Deterrence Policy] 2016 Vol.2(5):471-476
[Abstract] ( 187 ) [HTML 0 KB][PDF 1086 KB] (875)
28 [Research and Implementation of Access Control Method for Big Data Platform] 2016 Vol.2(10):913-919
[Abstract] ( 187 ) [HTML 0 KB][PDF 7525 KB] (146)
29 [Distributed Code Clone Detection Based on Index] 2016 Vol.2(3):201-210
[Abstract] ( 185 ) [HTML 0 KB][PDF 7511 KB] (179)
30 [“Internet +”Power: Overview of AsiaInfo Secruity’s Cyber Security] 2016 Vol.2(8):670-684
[Abstract] ( 181 ) [HTML 0 KB][PDF 1873 KB] (353)
Copyright © Editorial Board of Journal of Information Security Research