| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Comput. Networks
|
| 2025 | C | conf |
ISC
|
| 2025 | Misc | conf |
ICIN
|
| 2024 | C | conf |
SECRYPT
|
| 2023 | — | conf |
AFRICACRYPT
|
| 2021 | B | conf |
IM
|
| 2020 | J | jnl |
Applied graph theory to security: A qualitative placement of security solutions within IoT networks.
J. Inf. Secur. Appl.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Theor. Comput. Sci.
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | C | conf |
IPCCC
|
| 2018 | C | conf |
CW
|
| 2018 | — | conf |
TrustCom/BigDataSE
|
| 2017 | B | conf |
ARES
|
| 2017 | — | conf |
WIFS
|
| 2016 | B | conf |
ACNS
|
| 2015 | J | jnl |
CoRR
|
| 2015 | B | conf |
ARES
|
| 2015 | J | jnl |
CoRR
|
| 2014 | B | conf |
ISIT
|
| 2013 | J | jnl |
CoRR
|
| 2013 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2012 | J | jnl |
Finite Fields Their Appl.
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
Adv. Math. Commun.
|
| 2011 | — | — |
|
| 2011 | C | conf |
IMACC
|
| 2011 | J | jnl |
CoRR
|
| 2011 | J | jnl |
CoRR
|
| 2011 | B | conf |
ISIT
|
| 2011 | B | conf |
ITW
|
| 2011 | J | jnl |
CoRR
|
| 2011 | J | jnl |
CoRR
|
| 2010 | J | jnl |
CoRR
|
| 2010 | J | jnl |
CoRR
|