keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [Overview on SM9 Identity Based Cryptographic Algorithm] 2016 Vol.2(11):1008-1027
[Abstract] ( 663 ) [HTML 0 KB][PDF 13949 KB] (4642)
2 [Security Architecture and Key Technologies of Blockchain] 2016 Vol.2(12):1090-1097
Yan Zhu [Abstract] ( 336 ) [HTML 0 KB][PDF 6838 KB] (363)
3 [Overview on SM4 Algorithm] 2016 Vol.2(11):995-1007
[Abstract] ( 284 ) [HTML 0 KB][PDF 8653 KB] (313)
4 [The ZUC Stream Cipher Algorithm] 2016 Vol.2(11):1028-1041
[Abstract] ( 269 ) [HTML 0 KB][PDF 7769 KB] (215)
5 [Formal Verification Method of Smart Contract] 2016 Vol.2(12):1080-1089
[Abstract] ( 255 ) [HTML 0 KB][PDF 7621 KB] (324)
6 [SM3 Cryptographic Hash Algorithm] 2016 Vol.2(11):983-994
[Abstract] ( 247 ) [HTML 0 KB][PDF 8502 KB] (403)
7 [Meiya Pico,Innovation to Enhance the Core Technology of Cybersecurity] 2017 Vol.3(9):770-780
[Abstract] ( 242 ) [HTML 0 KB][PDF 1952 KB] (123)
8 [The TPCM Platform Measurement and Control Design] 2017 Vol.3(4):310-315
[Abstract] ( 241 ) [HTML 0 KB][PDF 4044 KB] (142)
9 [Overview on Public Key Crytographic Algorithm SM2 Based on Elliptic Curves] 2016 Vol.2(11):972-982
[Abstract] ( 236 ) [HTML 0 KB][PDF 7813 KB] (279)
10 [Quantum Random Number Generation] 2017 Vol.3(1):23-35
[Abstract] ( 235 ) [HTML 0 KB][PDF 11007 KB] (88)
11 [The Design of Smart Contracts on Crowd Funding Private Blockchain] 2017 Vol.3(3):211-219
[Abstract] ( 217 ) [HTML 0 KB][PDF 7360 KB] (210)
12 [Research and Application of Trusted Software Base] 2017 Vol.3(4):316-322
[Abstract] ( 205 ) [HTML 0 KB][PDF 4520 KB] (122)
13 [Blockchain Technology and Its Prospect of Industrial Application] 2017 Vol.3(3):200-210
[Abstract] ( 193 ) [HTML 0 KB][PDF 9369 KB] (191)
14 [A Review on Cross-Site Scripting] 2016 Vol.2(12):1068-1080
Sun Wei [Abstract] ( 184 ) [HTML 0 KB][PDF 9483 KB] (193)
15 [Research on the Sentiment Analysis Model of Product Reviews Based on Machine Learning] 2017 Vol.3(2):166-170
[Abstract] ( 168 ) [HTML 0 KB][PDF 3979 KB] (135)
16 [Research on the Legislation of Data Localization] 2017 Vol.3(2):182-187
[Abstract] ( 164 ) [HTML 0 KB][PDF 5587 KB] (127)
17 [Microsoft China: The Implementation of Information Security and Cooperative Strategy] 2017 Vol.3(5):386-397
[Abstract] ( 162 ) [HTML 0 KB][PDF 1668 KB] (209)
18 [Research on the Structural Security of Private Cloud in Government and Enterprise] 2017 Vol.3(2):188-192
[Abstract] ( 156 ) [HTML 0 KB][PDF 1236 KB] (167)
19 [ Blockchain Technology and Its Applications] 2017 Vol.3(3):237-245
Zheng Huang [Abstract] ( 155 ) [HTML 0 KB][PDF 7380 KB] (200)
20 [Analysis of Information Security Vulnerabilities and Penetration Attack Based on Social Engineering] 2017 Vol.3(2):116-122
[Abstract] ( 155 ) [HTML 0 KB][PDF 5294 KB] (229)
21 [Three-Dimensional Way of Acorn Network in Industrial Control Cybersecurity] 2017 Vol.3(8):0-0
null [Abstract] ( 153 ) [HTML 0 KB][PDF 3703 KB] (97)
22 [Network Intrusion Detection Method Based on Data Mining] 2017 Vol.3(9):810-816
[Abstract] ( 151 ) [HTML 0 KB][PDF 4877 KB] (113)
23 [IoT Botnets Threatened Network Infrastructure Security Seriously] 2016 Vol.2(11):1042-1048
[Abstract] ( 150 ) [HTML 0 KB][PDF 5537 KB] (355)
24 [Secure Operation Platform for Cloud Service] 2017 Vol.3(5):412-417
[Abstract] ( 144 ) [HTML 0 KB][PDF 5505 KB] (108)
25 [A Glimpse at Blockchain: From the Perspective of Privacy] 2017 Vol.3(11):981-989
[Abstract] ( 143 ) [HTML 0 KB][PDF 7718 KB] (113)
26 [Detection Method of Android Malware by Using Permission] 2017 Vol.3(9):817-822
[Abstract] ( 142 ) [HTML 0 KB][PDF 4627 KB] (116)
27 [The Latest Developments of Fiber Quantum Teleportation] 2017 Vol.3(1):36-43
[Abstract] ( 141 ) [HTML 0 KB][PDF 8026 KB] (98)
28 [A Review on Security Ontology: Document Analysis from 2010 to 2016] 2017 Vol.3(2):151-159
[Abstract] ( 140 ) [HTML 0 KB][PDF 6880 KB] (112)
29 [An Overview of Trusted Computing Structure Specification] 2017 Vol.3(4):299-304
[Abstract] ( 138 ) [HTML 0 KB][PDF 4215 KB] (194)
Copyright © Editorial Board of Journal of Information Security Research