| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2013 | C | conf |
DSD
|
| 2012 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2012 | B | conf |
TrustCom
|
| 2012 | J | jnl |
CoRR
|
| 2010 | B | conf |
GLOBECOM
|
| 2010 | J | jnl |
Int. J. Netw. Secur.
|
| 2009 | A | conf |
IPDPS
|
| 2009 | C | conf |
ISCAS
|
| 2009 | J | jnl |
J. Frankl. Inst.
|
| 2009 | C | conf |
ISCAS
|
| 2009 | J | jnl |
J. Electr. Comput. Eng.
|
| 2009 | J | jnl |
IEEE Embed. Syst. Lett.
|
| 2008 | C | conf |
ISCAS
|
| 2007 | J | jnl |
IEEE Trans. Computers
|
| 2006 | J | jnl |
Int. J. Netw. Secur.
|
| 2006 | J | jnl |
A New Source Coding Scheme with Small Expected Length and Its Application to Simple Data Encryption.
IEEE Trans. Computers
|
| 2006 | J | jnl |
Comput. Secur.
|
| 2006 | C | conf |
ISCAS
|
| 2006 | — | conf |
ISVLSI
|
| 2006 | J | jnl |
Int. J. Netw. Secur.
|
| 2006 | J | jnl |
IEEE Trans. Circuits Syst. I Regul. Pap.
|
| 2006 | B | conf |
ISIT
|
| 2005 | B | conf |
ISIT
|
| 2005 | — | conf |
ISVLSI
|
| 2005 | A | conf |
FPGA
|
| 2005 | — | conf |
Implementation and performance analysis of IEEE 802.11i standard using the IXP425 network processor.
PE-WASUN
|
| 2005 | J | jnl |
IEEE Trans. Computers
|
| 2005 | — | conf |
ISCAS (5)
|
| 2005 | — | conf |
ISCAS (1)
|
| 2005 | J | jnl |
Theor. Comput. Sci.
|
| 2004 | — | conf |
ISCAS (2)
|
| 2004 | B | conf |
GLOBECOM
|
| 2004 | — | conf |
ISCAS (2)
|
| 2004 | B | conf |
ISIT
|
| 2003 | J | jnl |
IEEE Trans. Computers
|
| 2002 | C | conf |
DSD
|
| 1998 | J | jnl |
IEEE Trans. Syst. Man Cybern. Part B
|
| 1997 | — | conf |
PP
|
| 1997 | — | conf |
PP
|
| 1997 | J | jnl |
IEEE Trans. Computers
|
| 1996 | J | jnl |
IEEE Trans. Computers
|
| 1996 | J | jnl |
IEEE Trans. Computers
|
| 1996 | J | jnl |
IEEE Trans. Computers
|
| 1995 | J | jnl |
IEEE Trans. Computers
|
| 1995 | — | conf |
PP
|
| 1994 | J | jnl |
IEEE Trans. Computers
|