keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

In last 2 years
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (663) [HTML 0 KB][PDF 13949 KB] (4642)
2 Artifcial Intelligence Promotes the Paradigm Shift of Information Security —A Case Study of Driverless Car by Baidu 2016 Vol.2(11):958-968
[Abstract] (118) [HTML 0 KB][PDF 2086 KB] (473)
3 Building Cyber Security Defense by Trusted Computing 3.0 2017 Vol.3(4):290-298
[Abstract] (124) [HTML 0 KB][PDF 1075 KB] (436)
4 SM3 Cryptographic Hash Algorithm 2016 Vol.2(11):983-994
[Abstract] (247) [HTML 0 KB][PDF 8502 KB] (403)
5 Security Architecture and Key Technologies of Blockchain 2016 Vol.2(12):1090-1097
Yan Zhu [Abstract] (336) [HTML 0 KB][PDF 6838 KB] (363)
6 IoT Botnets Threatened Network Infrastructure Security Seriously 2016 Vol.2(11):1042-1048
[Abstract] (150) [HTML 0 KB][PDF 5537 KB] (355)
7 Practical Confrontation Promote the Development of Sustainability —Comments on Network Attack and Defense Drill in Actual Bigdata Environment 2018 Vol.4(5):410-411
[Abstract] (19) [HTML 0 KB][PDF 707 KB] (337)
8 Formal Verification Method of Smart Contract 2016 Vol.2(12):1080-1089
[Abstract] (255) [HTML 0 KB][PDF 7621 KB] (324)
9 Overview on SM4 Algorithm 2016 Vol.2(11):995-1007
[Abstract] (284) [HTML 0 KB][PDF 8653 KB] (313)
10 Explorations and Re?ections on Cyberspace Security Talents Training 2016 Vol.2(11):1049-1050
[Abstract] (76) [HTML 0 KB][PDF 4182 KB] (312)
11 Construction of Critical Information Infrastructure Protection System Based on?Classifed?Protection?and?Trusted?Computing 2017 Vol.3(4):375-381
[Abstract] (47) [HTML 0 KB][PDF 1036 KB] (287)
12 Progress and Challenges of Intelligent Surveillance Industry Security 2017 Vol.3(3):277-280
[Abstract] (56) [HTML 0 KB][PDF 936 KB] (282)
13 Overview on Public Key Crytographic Algorithm SM2 Based on Elliptic Curves 2016 Vol.2(11):972-982
[Abstract] (236) [HTML 0 KB][PDF 7813 KB] (279)
14 Research of Electronic Invoice System Based on Block Chain 2017 Vol.3(6):516-522
[Abstract] (120) [HTML 0 KB][PDF 3190 KB] (275)
15 Venustech’s Continuous Construction of the Information Security Ecological Chain — Analyze the Information and Cyber Security Strategy of Venustech 2017 Vol.3(2):98-115
[Abstract] (86) [HTML 0 KB][PDF 3877 KB] (241)
16 Research and Application of Security Data Space Construction Method 2016 Vol.2(12):1098-1104
Sun Wei [Abstract] (72) [HTML 0 KB][PDF 6721 KB] (237)
17 Analysis of Information Security Vulnerabilities and Penetration Attack Based on Social Engineering 2017 Vol.3(2):116-122
[Abstract] (155) [HTML 0 KB][PDF 5294 KB] (229)
18 A Network Security Protection Research for Industrial Control System 2017 Vol.3(2):171-176
[Abstract] (109) [HTML 0 KB][PDF 5018 KB] (225)
19 Semantics Based Webshell Detection Method Research 2017 Vol.3(2):145-150
[Abstract] (113) [HTML 0 KB][PDF 4585 KB] (220)
20 The ZUC Stream Cipher Algorithm 2016 Vol.2(11):1028-1041
[Abstract] (269) [HTML 0 KB][PDF 7769 KB] (215)
21 The Design of Smart Contracts on Crowd Funding Private Blockchain 2017 Vol.3(3):211-219
[Abstract] (217) [HTML 0 KB][PDF 7360 KB] (210)
22 Microsoft China: The Implementation of Information Security and Cooperative Strategy 2017 Vol.3(5):386-397
[Abstract] (162) [HTML 0 KB][PDF 1668 KB] (209)
23 CFL Authentication System and Its Applications in the Blockchain 2017 Vol.3(3):220-226
[Abstract] (106) [HTML 0 KB][PDF 5196 KB] (206)
24 Blockchain Technology and Its Applications 2017 Vol.3(3):237-245
Zheng Huang [Abstract] (155) [HTML 0 KB][PDF 7380 KB] (200)
25 An Overview of Trusted Computing Structure Specification 2017 Vol.3(4):299-304
[Abstract] (138) [HTML 0 KB][PDF 4215 KB] (194)
26 A Review on Cross-Site Scripting 2016 Vol.2(12):1068-1080
Sun Wei [Abstract] (184) [HTML 0 KB][PDF 9483 KB] (193)
27 SURFILTER, Insisting on the Road of Independent Innovation of Information Security -- Review of the Information and Network Security Strategy of SURFILTER 2016 Vol.2(12):1054-1067
[Abstract] (89) [HTML 0 KB][PDF 5217 KB] (192)
Copyright © Editorial Board of Journal of Information Security Research