| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
J. Imaging Inform. Medicine
|
| 2025 | J | jnl |
J. Medical Syst.
|
| 2025 | J | jnl |
NeuroImage
|
| 2025 | J | jnl |
J. Imaging Inform. Medicine
|
| 2025 | J | jnl |
J. Medical Syst.
|
| 2025 | J | jnl |
J. Medical Syst.
|
| 2025 | — | conf |
ISMSI
|
| 2024 | J | jnl |
J. Imaging Inform. Medicine
|
| 2024 | J | jnl |
J. Medical Syst.
|
| 2024 | J | jnl |
J. Medical Syst.
|
| 2024 | J | jnl |
J. Medical Syst.
|
| 2024 | J | jnl |
J. Imaging Inform. Medicine
|
| 2024 | J | jnl |
J. Inf. Sci. Eng.
|
| 2023 | J | jnl |
J. Medical Syst.
|
| 2023 | — | conf |
ICIT
|
| 2023 | J | jnl |
Comput. Medical Imaging Graph.
|
| 2023 | — | conf |
MIDL
|
| 2022 | J | jnl |
Int. J. Prod. Res.
|
| 2022 | J | jnl |
npj Digit. Medicine
|
| 2022 | J | jnl |
Comput. Medical Imaging Graph.
|
| 2021 | J | jnl |
Int. J. Inf. Comput. Secur.
|
| 2020 | — | conf |
NEMS
|
| 2020 | — | conf |
Secure and flexible algorithm for outsourcing of bilinear pairings effectively resisting conspiracy.
AsiaJCIS
|
| 2019 | — | conf |
ICCBN
|
| 2018 | A | conf |
ICS
|
| 2018 | — | conf |
DSC
|
| 2017 | — | conf |
NEMS
|
| 2016 | — | conf |
NEMS
|
| 2016 | — | conf |
NEMS
|
| 2016 | — | conf |
NEMS
|
| 2016 | — | conf |
AsiaJCIS
|
| 2016 | J | jnl |
Int. J. Netw. Secur.
|
| 2015 | — | conf |
NEMS
|
| 2015 | J | jnl |
Signal Process.
|
| 2014 | A | conf |
ICS
|
| 2013 | J | jnl |
Secur. Commun. Networks
|
| 2013 | — | conf |
AsiaJCIS
|
| 2013 | J | jnl |
NeuroImage
|
| 2012 | — | conf |
NEMS
|
| 2011 | J | jnl |
Ind. Manag. Data Syst.
|
| 2011 | — | conf |
ICGEC
|
| 2011 | — | conf |
IMIS
|
| 2011 | A | conf |
INTERSPEECH
|
| 2011 | — | conf |
NEMS
|
| 2010 | — | conf |
NDT (1)
|
| 2010 | J | jnl |
J. Comput. Assist. Learn.
|
| 2009 | — | conf |
A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment.
HIS (1)
|
| 2007 | — | conf |
Security and Management
|
| 2007 | J | jnl |
Inf. Sci.
|
| 2007 | J | jnl |
Informatica
|
| 2006 | C | conf |
UIC
|
| 2006 | J | jnl |
Comput. Electr. Eng.
|
| 2006 | J | jnl |
J. Inf. Sci. Eng.
|
| 2006 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2005 | J | jnl |
ACM SIGOPS Oper. Syst. Rev.
|
| 2005 | J | jnl |
Appl. Math. Comput.
|
| 2005 | Misc | conf |
AMIA
|
| 2004 | J | jnl |
Informatica
|
| 2003 | A | conf |
ASIACRYPT
|
| 2000 | J | jnl |
Cryptologia
|
| 2000 | J | jnl |
Appl. Math. Comput.
|
| 1999 | J | jnl |
Inf. Process. Lett.
|
| 1999 | J | jnl |
Comput. Commun.
|
| 1999 | J | jnl |
The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures.
Inf. Process. Lett.
|
| 1998 | J | jnl |
Inf. Process. Lett.
|
| 1998 | Misc | conf |
ACISP
|
| 1997 | — | conf |
ISW
|
| 1997 | J | jnl |
Comput. Secur.
|
| 1997 | A | conf |
ACSAC
|
| 1995 | A* | conf |
EUROCRYPT
|
| 1995 | J | jnl |
Comput. Commun.
|