keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

Published in last 1 year
  
1 Research of Electronic Invoice System Based on Block Chain 2017 Vol.3(6):516-522
[Abstract] (110) [HTML 0 KB][PDF 3190 KB] (218)
2 Microsoft China: The Implementation of Information Security and Cooperative Strategy 2017 Vol.3(5):386-397
[Abstract] (153) [HTML 0 KB][PDF 1668 KB] (166)
3 Network intrusion detection model based on convolutional neural network 2017 Vol.3(11):990-994
[Abstract] (80) [HTML 0 KB][PDF 3567 KB] (118)
4 Scheme of Encrypted Cloud Data Transmission and Achieve the Data Integrity Valid 2017 Vol.3(7):647-651
[Abstract] (69) [HTML 0 KB][PDF 6250 KB] (117)
5 Talking About the Application of the Commercial Cryptography 2017 Vol.3(5):477-480
[Abstract] (46) [HTML 0 KB][PDF 723 KB] (116)
6 Some Thoughts on the Current Cryptologic Research 2017 Vol.3(10):0-0
[Abstract] (45) [HTML 0 KB][PDF 693 KB] (103)
7 PeopleNet, Independently Developing Core Technology of Cyber Information Security 2017 Vol.3(7):578-588
[Abstract] (59) [HTML 0 KB][PDF 1448 KB] (100)
8 A Formal Analysis Method with Forward Reasoning for Cryptographic Protocols 2017 Vol.3(5):462-468
[Abstract] (47) [HTML 0 KB][PDF 5238 KB] (100)
9 Fine-Grained Access Control and Audit Management in Big Data Environment 2017 Vol.3(6):509-516
[Abstract] (109) [HTML 0 KB][PDF 2431 KB] (99)
10 Research on Smart City Information Security System 2017 Vol.3(8):0-0
null [Abstract] (57) [HTML 0 KB][PDF 6796 KB] (99)
11 Overview of Big Data Forensics Technology 2017 Vol.3(9):795-802
[Abstract] (99) [HTML 0 KB][PDF 6061 KB] (98)
12 Quantum Key Digital Certificate System and Its Application 2017 Vol.3(6):494-500
[Abstract] (54) [HTML 0 KB][PDF 1447 KB] (93)
13 Cybersecurity Capability Construction: Coordination of Consciousness, Management and Technology —Thoughts Triggered by the “Eternal Blue” Event 2017 Vol.3(8):0-0
null [Abstract] (37) [HTML 0 KB][PDF 882 KB] (90)
14 Secure Operation Platform for Cloud Service 2017 Vol.3(5):412-417
[Abstract] (129) [HTML 0 KB][PDF 5505 KB] (89)
15 Meiya Pico,Innovation to Enhance the Core Technology of Cybersecurity 2017 Vol.3(9):770-780
[Abstract] (228) [HTML 0 KB][PDF 1952 KB] (88)
16 From “Latter-wit” to “Nip in the Bud” 2017 Vol.3(11):962-965
[Abstract] (66) [HTML 0 KB][PDF 700 KB] (86)
17 Detection Method of Android Malware by Using Permission 2017 Vol.3(9):817-822
[Abstract] (126) [HTML 0 KB][PDF 4627 KB] (85)
18 Trusted Computing: Constructing a New Architecture for Cloud Security 2017 Vol.3(5):440-450
[Abstract] (78) [HTML 0 KB][PDF 9099 KB] (83)
19 Promoting Information Security Is the Responsibility of the Enterprise 2017 Vol.3(5):427-431
[Abstract] (75) [HTML 0 KB][PDF 476 KB] (82)
20 Cyber Range Based Security Analysis of DNC Protocol 2017 Vol.3(6):560-567
[Abstract] (63) [HTML 0 KB][PDF 4218 KB] (82)
21 Digital Authentication Connecting the Trusted World 2017 Vol.3(6):482-493
[Abstract] (45) [HTML 0 KB][PDF 4500 KB] (82)
22 An Anti-Lost Scheme Research for Confidential Files Based on BlockChain Technology 2017 Vol.3(10):0-0
null [Abstract] (60) [HTML 0 KB][PDF 2742 KB] (82)
23 On the Limitations of IOT Security Standards 2017 Vol.3(9):860-864
[Abstract] (63) [HTML 0 KB][PDF 903 KB] (81)
24 A Formal Specification and Verification Method for Security Specification Based on CC 2017 Vol.3(7):617-623
[Abstract] (24) [HTML 0 KB][PDF 5250 KB] (81)
25 Pay Serious Attention to National Security Issue in Windows 10 ( Government Edition), Develop Creative China-Made OS 2017 Vol.3(8):0-0
null [Abstract] (51) [HTML 0 KB][PDF 810 KB] (80)
Copyright © Editorial Board of Journal of Information Security Research