keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

In last 2 years
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (586) [HTML 0 KB][PDF 13949 KB] (2102)
2 Analysis and Enlightenment of American Cyber Deterrence Policy 2016 Vol.2(5):471-476
[Abstract] (211) [HTML 0 KB][PDF 1086 KB] (932)
3 “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background 2016 Vol.2(5):384-395
[Abstract] (259) [HTML 0 KB][PDF 1491 KB] (685)
4 “Internet +”Power: The Information Security and Strategic Layout of Huawei on the Basis of “Internet +” Background 2016 Vol.2(6):478-489
[Abstract] (182) [HTML 0 KB][PDF 930 KB] (499)
5 The Development Status and Tendency of Internet Trusted Identity Management 2016 Vol.2(7):666-668
[Abstract] (152) [HTML 0 KB][PDF 1518 KB] (495)
6 A High Code Coverage Static and Dyamic Combined Fuzzing Method 2016 Vol.2(8):699-705
[Abstract] (156) [HTML 0 KB][PDF 6669 KB] (438)
7 The Method and Realization of Android Applications Malicious Code Static Injection 2016 Vol.2(7):660-664
[Abstract] (140) [HTML 0 KB][PDF 5039 KB] (435)
8 A Review on Image Reversible Data Hiding 2016 Vol.2(8):729-734
[Abstract] (236) [HTML 0 KB][PDF 5707 KB] (387)
9 “Internet +”Power: Overview of AsiaInfo Secruity’s Cyber Security 2016 Vol.2(8):670-684
[Abstract] (199) [HTML 0 KB][PDF 1873 KB] (385)
10 Comparative Study on the Properties of CFL 2016 Vol.2(7):600-607
[Abstract] (72) [HTML 0 KB][PDF 5745 KB] (367)
11 “Internet +”Power: The Information Security and Strategic Layout of Lenovo on the Basis of “Internet +” Background 2016 Vol.2(7):574-586
[Abstract] (87) [HTML 0 KB][PDF 3175 KB] (364)
12 The Research on Cyberspace Security Countermeasures Simulation Model 2016 Vol.2(8):0-0
[Abstract] (139) [HTML 0 KB][PDF 6359 KB] (357)
13 Artifcial Intelligence Promotes the Paradigm Shift of Information Security —A Case Study of Driverless Car by Baidu 2016 Vol.2(11):958-968
[Abstract] (103) [HTML 0 KB][PDF 2086 KB] (355)
14 CFL’s Schemes for Classical Information Security Problems 2016 Vol.2(7):639-648
[Abstract] (159) [HTML 0 KB][PDF 8174 KB] (348)
15 Technology Architecture of IoT Security 2016 Vol.2(5):417-423
[Abstract] (156) [HTML 0 KB][PDF 5847 KB] (348)
16 “Internet +”Power: Overview of Westone Secruity’s Cyber Secruity 2016 Vol.2(10):862-875
[Abstract] (118) [HTML 0 KB][PDF 2788 KB] (341)
17 The Totlal Solution of Cyber Security in Critical Information Infrastructure 2016 Vol.2(10):946-951
[Abstract] (88) [HTML 0 KB][PDF 1455 KB] (341)
18 Research of the Index of National Cybersecurity 2016 Vol.2(9):766-773
Lv Xin [Abstract] (133) [HTML 0 KB][PDF 1086 KB] (333)
19 Building Cyber Security Defense by Trusted Computing 3.0 2017 Vol.3(4):290-298
[Abstract] (109) [HTML 0 KB][PDF 1075 KB] (333)
20 The Development Trend and Critical Capacities of “Security as Cloud Service” 2016 Vol.2(6):568-572
[Abstract] (108) [HTML 0 KB][PDF 776 KB] (328)
21 Security Architecture and Key Technologies of Blockchain 2016 Vol.2(12):1090-1097
Yan Zhu [Abstract] (318) [HTML 0 KB][PDF 6838 KB] (324)
22 IoT Botnets Threatened Network Infrastructure Security Seriously 2016 Vol.2(11):1042-1048
[Abstract] (139) [HTML 0 KB][PDF 5537 KB] (319)
23 The Present Situation and Thought of Cloud Computing Security Standards at Home and Abroad 2016 Vol.2(5):424-428
[Abstract] (216) [HTML 0 KB][PDF 4332 KB] (319)
24 CFL is Statistical Zero Knowledge Proof System 2016 Vol.2(7):621-627
[Abstract] (92) [HTML 0 KB][PDF 4887 KB] (318)
25 The Application Research of Reliable Electronic Signature in the Field of Arbitration 2016 Vol.2(6):519-522
[Abstract] (94) [HTML 0 KB][PDF 1257 KB] (315)
26 Research on the Construction of the National Cyber?Space Governance Hierarchy 2016 Vol.2(6):537-542
[Abstract] (177) [HTML 0 KB][PDF 5059 KB] (313)
27 The Research on International Cyber Security Standards 2016 Vol.2(5):397-403
[Abstract] (112) [HTML 0 KB][PDF 4976 KB] (312)
28 Electronic Authentication in a Trusted Electronic License Application 2016 Vol.2(6):543-547
[Abstract] (106) [HTML 0 KB][PDF 3523 KB] (306)
Copyright © Editorial Board of Journal of Information Security Research