· Survey of Hash Functions [2015, No.1:19-30] (3035)
· Overview on SM9 Identity Based Cryptographic Algorithm [2016, No.11:1008-1027] (1003)
· Analysis and Enlightenment of American Cyber Deterrence Policy [2016, No.5:471-476] (875)
· “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background [2016, No.5:384-395] (620)
· New Trends of the Main Countries Cybersecurity Strategy in 2015 [2015, No.1:2-08] (545)