| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
Information Security in a Connected World
|
| 2025 | — | conf |
AsiaJCIS
|
| 2025 | — | book |
|
| 2023 | — | conf |
ICISC (2)
|
| 2022 | J | jnl |
IEEE Access
|
| 2021 | — | book |
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Commun. ACM
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2020 | J | jnl |
IEEE Access
|
| 2019 | — | conf |
ML4CS
|
| 2019 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2018 | Misc | conf |
WISA
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2018 | — | book |
|
| 2017 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2017 | — | conf |
IWBIS
|
| 2017 | Misc | conf |
WISA
|
| 2017 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2017 | — | conf |
PerCom Workshops
|
| 2017 | J | jnl |
PeerJ Prepr.
|
| 2017 | — | conf |
IWBIS
|
| 2016 | — | conf |
BigComp
|
| 2016 | — | conf |
BigComp
|
| 2016 | J | jnl |
IEEE Trans. Cybern.
|
| 2016 | Misc | conf |
WISA
|
| 2016 | C | ed. |
ICICS
|
| 2016 | Misc | conf |
INDOCRYPT
|
| 2015 | J | jnl |
Secur. Commun. Networks
|
| 2015 | C | conf |
SECRYPT
|
| 2015 | — | conf |
AsiaJCIS
|
| 2014 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2014 | J | jnl |
Inf. Sci.
|
| 2014 | — | conf |
ICDCS Workshops
|
| 2013 | J | jnl |
Telecommun. Syst.
|
| 2013 | — | conf |
AsiaJCIS
|
| 2012 | J | jnl |
Math. Comput. Model.
|
| 2012 | J | jnl |
Ad Hoc Sens. Wirel. Networks
|
| 2012 | J | jnl |
Inf. Sci.
|
| 2012 | J | jnl |
Pers. Ubiquitous Comput.
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
Int. J. Commun. Syst.
|
| 2011 | J | jnl |
Comput. Commun.
|
| 2011 | J | jnl |
Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security.
IEICE Trans. Commun.
|
| 2011 | J | jnl |
Comput. Electr. Eng.
|
| 2011 | J | jnl |
IET Commun.
|
| 2011 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2011 | A* | conf |
INFOCOM
|
| 2011 | J | jnl |
Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment.
IEICE Trans. Commun.
|
| 2011 | J | jnl |
Inf. Sci.
|
| 2010 | — | conf |
EuroPKI
|
| 2010 | J | jnl |
IEEE Trans. Consumer Electron.
|
| 2010 | A* | conf |
CCS
|
| 2010 | J | jnl |
Comput. Electr. Eng.
|
| 2010 | J | jnl |
Inf. Sci.
|
| 2010 | Misc | conf |
ACISP
|
| 2010 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2010 | — | conf |
ICITST
|
| 2010 | — | conf |
Financial Cryptography
|
| 2010 | J | jnl |
Sensors
|
| 2009 | — | conf |
WTS
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | — | conf |
SECURWARE
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | Misc | conf |
CISS
|
| 2009 | — | conf |
ICITST
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
Inf. Sci.
|
| 2008 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | J | jnl |
Inf. Sci.
|
| 2008 | B | conf |
ACNS
|
| 2008 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2007 | Misc | conf |
ICISC
|
| 2007 | C | conf |
ProvSec
|
| 2007 | B | conf |
GLOBECOM
|
| 2007 | C | conf |
ProvSec
|
| 2007 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2006 | — | conf |
EUC Workshops
|
| 2006 | J | jnl |
IEEE Trans. Veh. Technol.
|
| 2006 | Misc | conf |
ICISC
|
| 2005 | — | conf |
PerCom Workshops
|
| 2005 | J | jnl |
Appl. Math. Comput.
|
| 2005 | J | jnl |
Appl. Math. Comput.
|
| 2005 | J | jnl |
Appl. Math. Comput.
|
| 2005 | B | conf |
MASS
|
| 2005 | Misc | conf |
ICISC
|
| 2004 | B | conf |
GLOBECOM
|
| 2004 | — | conf |
ICON
|
| 2004 | C | conf |
ISC
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | Misc | conf |
WISA
|
| 2004 | J | jnl |
Comput. Networks
|
| 2004 | B | conf |
ACNS
|
| 2004 | Misc | conf |
INDOCRYPT
|
| 2004 | — | conf |
ACSW
|
| 2004 | — | conf |
EuroPKI
|
| 2004 | Misc | conf |
ACISP
|
| 2003 | C | conf |
ICICS
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2003 | B | conf |
ACNS
|
| 2003 | B | conf |
GLOBECOM
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | Misc | conf |
ACISP
|
| 2003 | C | conf |
ICICS
|
| 2003 | Misc | conf |
INDOCRYPT
|
| 2003 | Misc | conf |
ACISP
|
| 2003 | Misc | conf |
WISA
|
| 2003 | Misc | conf |
ICISC
|
| 2003 | Misc | conf |
ICISC
|
| 2002 | Misc | conf |
ACISP
|
| 2002 | C | conf |
ICICS
|
| 2002 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2002 | Misc | conf |
ACISP
|
| 2002 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2002 | J | jnl |
J. Commun. Networks
|
| 2002 | A | conf |
ASIACRYPT
|
| 2002 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2002 | Misc | ed. |
ICISC
|
| 2002 | Misc | conf |
ICISC
|
| 2002 | Misc | conf |
INDOCRYPT
|
| 2001 | Misc | conf |
ICISC
|
| 2001 | J | jnl |
J. Netw. Comput. Appl.
|
| 2001 | Misc | conf |
INDOCRYPT
|
| 2001 | Misc | conf |
ICISC
|
| 2001 | — | ed. |
Public Key Cryptography
|
| 2001 | Misc | conf |
ACISP
|
| 2000 | Misc | conf |
ACISP
|
| 2000 | Misc | conf |
ICISC
|
| 2000 | C | conf |
WETICE
|
| 2000 | Misc | conf |
INDOCRYPT
|
| 1999 | Misc | conf |
ICISC
|
| 1999 | — | conf |
ICPP Workshops
|
| 1997 | J | jnl |
Inf. Process. Lett.
|
| 1997 | C | conf |
ICICS
|
| 1996 | A | ed. |
ASIACRYPT
|
| 1994 | A | conf |
ASIACRYPT
|
| 1991 | A | conf |
ASIACRYPT
|
| 1990 | A* | conf |
CRYPTO
|