| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2021 | J | jnl |
Neurocomputing
|
| 2019 | — | conf |
DCAI (Special Sessions)
|
| 2016 | J | jnl |
Integr. Comput. Aided Eng.
|
| 2016 | Misc | conf |
DCAI
|
| 2016 | Misc | conf |
DCAI
|
| 2015 | — | conf |
IWINAC (2)
|
| 2015 | J | jnl |
Comput. Appl. Eng. Educ.
|
| 2015 | J | jnl |
Cryptologia
|
| 2015 | — | conf |
CISIS-ICEUTE
|
| 2010 | — | conf |
ICEIS (4)
|
| 2010 | — | conf |
ICEIS (5)
|
| 2009 | J | jnl |
Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range.
Inf. Sci.
|
| 2009 | J | jnl |
Int. J. Comput. Math.
|
| 2008 | — | conf |
ICCS (2)
|
| 2008 | J | jnl |
Comput. Math. Appl.
|
| 2006 | Misc | conf |
International Conference on Computational Science (2)
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | J | jnl |
Appl. Math. Lett.
|