· Survey of Hash Functions [2015, No.1:19-30] (3059)
· Overview on SM9 Identity Based Cryptographic Algorithm [2016, No.11:1008-1027] (2102)
· Analysis and Enlightenment of American Cyber Deterrence Policy [2016, No.5:471-476] (932)
· “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background [2016, No.5:384-395] (685)
· New Trends of the Main Countries Cybersecurity Strategy in 2015 [2015, No.1:2-08] (561)