| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2013 | J | jnl |
Int. J. Commun. Syst.
|
| 2013 | J | jnl |
Ad Hoc Sens. Wirel. Networks
|
| 2013 | J | jnl |
Peer-to-Peer Netw. Appl.
|
| 2013 | J | jnl |
Int. J. Ad Hoc Ubiquitous Comput.
|
| 2013 | J | jnl |
Secur. Commun. Networks
|
| 2013 | J | jnl |
Peer-to-Peer Netw. Appl.
|
| 2012 | J | jnl |
Int. J. Netw. Secur.
|
| 2012 | J | jnl |
Int. J. Electron. Secur. Digit. Forensics
|
| 2012 | J | jnl |
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci.
|
| 2012 | J | jnl |
Secur. Commun. Networks
|
| 2012 | J | jnl |
Int. Arab J. Inf. Technol.
|
| 2012 | J | jnl |
J. Medical Syst.
|
| 2011 | J | jnl |
Int. J. Netw. Manag.
|
| 2011 | J | jnl |
J. Inf. Sci. Eng.
|
| 2010 | J | jnl |
IEEE Commun. Lett.
|
| 2010 | J | jnl |
IEEE Commun. Lett.
|
| 2009 | — | conf |
PACCS
|
| 2008 | — | conf |
ISCSCT (1)
|
| 2006 | — | conf |
IMSCCS (2)
|