· Overview on SM9 Identity Based Cryptographic Algorithm [2016, No.11:1008-1027] (4642)
· Survey of Hash Functions [2015, No.1:19-30] (3124)
· Analysis and Enlightenment of American Cyber Deterrence Policy [2016, No.5:471-476] (1128)
· “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background [2016, No.5:384-395] (811)
· Differential Privacy and Applications [2015, No.3:224-229] (645)