keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

Most Downloaded in Recent Year
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (581) [HTML 0 KB][PDF 13949 KB] (2078)
2 Analysis and Enlightenment of American Cyber Deterrence Policy 2016 Vol.2(5):471-476
[Abstract] (210) [HTML 0 KB][PDF 1086 KB] (929)
3 Opportunities and Challenges of E-Commerce Data Security in Big Data Era 2016 Vol.2(2):186-190
Ning Jiajun [Abstract] (159) [HTML 0 KB][PDF 1890 KB] (524)
4 Building Cyber Security Defense by Trusted Computing 3.0 2017 Vol.3(4):290-298
[Abstract] (109) [HTML 0 KB][PDF 1075 KB] (333)
5 A High Code Coverage Static and Dyamic Combined Fuzzing Method 2016 Vol.2(8):699-705
[Abstract] (156) [HTML 0 KB][PDF 6669 KB] (438)
6 The Development Status and Tendency of Internet Trusted Identity Management 2016 Vol.2(7):666-668
[Abstract] (153) [HTML 0 KB][PDF 1518 KB] (494)
7 Comparative Study on the Properties of CFL 2016 Vol.2(7):600-607
[Abstract] (72) [HTML 0 KB][PDF 5745 KB] (367)
8 Research of Electronic Invoice System Based on Block Chain 2017 Vol.3(6):516-522
[Abstract] (110) [HTML 0 KB][PDF 3190 KB] (217)
9 “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background 2016 Vol.2(5):384-395
[Abstract] (262) [HTML 0 KB][PDF 1491 KB] (666)
10 The Method and Realization of Android Applications Malicious Code Static Injection 2016 Vol.2(7):660-664
[Abstract] (137) [HTML 0 KB][PDF 5039 KB] (435)
11 Differential Privacy and Applications 2015 Vol.1(3):224-229
[Abstract] (532) [HTML 0 KB][PDF 5750 KB] (550)
12 Security Authentication Protocol Based on Grain-v1 in National Military Standard 2016 Vol.2(6):513-518
[Abstract] (119) [HTML 0 KB][PDF 4984 KB] (300)
13 Construction of Critical Information Infrastructure Protection System Based on?Classifed?Protection?and?Trusted?Computing 2017 Vol.3(4):375-381
[Abstract] (36) [HTML 0 KB][PDF 1036 KB] (218)
14 Research on The Technology Architecture of Big Data Security and Privacy System 2016 Vol.2(3):244-250
Lv Xin [Abstract] (367) [HTML 0 KB][PDF 6172 KB] (458)
15 A Searchable PHR Cloud Service System Supporting FineGrained Privilege Control 2016 Vol.2(3):264-271
[Abstract] (161) [HTML 0 KB][PDF 6456 KB] (305)
16 Research on the Construction of the National Cyber?Space Governance Hierarchy 2016 Vol.2(6):537-542
[Abstract] (178) [HTML 0 KB][PDF 5059 KB] (311)
17 Cybersecurity Research for Instant Messaging in Social Network System 2016 Vol.2(3):280-283
[Abstract] (134) [HTML 0 KB][PDF 768 KB] (519)
18 Smartphone Image Recovery and Forensics Based on WinHex 2016 Vol.2(4):328-332
[Abstract] (140) [HTML 0 KB][PDF 4459 KB] (386)
19 The Research on Cyberspace Security Countermeasures Simulation Model 2016 Vol.2(8):0-0
[Abstract] (139) [HTML 0 KB][PDF 6359 KB] (357)
20 CFL’s Schemes for Classical Information Security Problems 2016 Vol.2(7):639-648
[Abstract] (159) [HTML 0 KB][PDF 8174 KB] (347)
21 Research on Data Reading Technology of Android Smart Phone Based on eMMC 2016 Vol.2(4):317-323
[Abstract] (370) [HTML 0 KB][PDF 5047 KB] (314)
22 Technology Architecture of IoT Security 2016 Vol.2(5):417-423
[Abstract] (156) [HTML 0 KB][PDF 5847 KB] (346)
23 Overview of Electronic Data Forensics Technology 2016 Vol.2(4):299-306
[Abstract] (399) [HTML 0 KB][PDF 5966 KB] (346)
24 Study of Finger Vein Recognition Application 2016 Vol.2(1):86-92
[Abstract] (379) [HTML 0 KB][PDF 5765 KB] (344)
25 “Internet Plus” Mobile Power: Analysis the Network Security of ZTE 2016 Vol.2(4):288-298
[Abstract] (671) [HTML 0 KB][PDF 1637 KB] (467)
26 Evidence Extraction of USB Storage Device Accessing Traces under the Windows 7 System 2016 Vol.2(4):333-338
[Abstract] (138) [HTML 0 KB][PDF 5162 KB] (369)
27 A Malicious Code Detection Method Based on Data Mining and Machine Learning 2016 Vol.2(1):74-79
[Abstract] (208) [HTML 0 KB][PDF 4535 KB] (376)
28 Study on Security of Card System in Smart Campus 2016 Vol.2(5):454-461
[Abstract] (134) [HTML 0 KB][PDF 6098 KB] (286)
29 CFL is Statistical Zero Knowledge Proof System 2016 Vol.2(7):621-627
[Abstract] (92) [HTML 0 KB][PDF 4887 KB] (318)
30 Research on Character Recognition of Reconstructed Image from Electromagnetic Emanation of Information Equipment 2016 Vol.2(2):137-142
Xu Yanyun1, Guo Jia2, Li Yiwei1,3, and Sun Degang1 [Abstract] (88) [HTML 0 KB][PDF 5100 KB] (311)
Copyright © Editorial Board of Journal of Information Security Research