| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
IEEE Trans. Netw. Sci. Eng.
|
| 2024 | J | jnl |
IEEE Internet Things J.
|
| 2024 | J | jnl |
Sensors
|
| 2023 | J | jnl |
IEEE Access
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
IEEE Internet Things J.
|
| 2018 | J | jnl |
Peer-to-Peer Netw. Appl.
|
| 2017 | J | jnl |
Wirel. Pers. Commun.
|
| 2017 | — | conf |
ICMLSC
|
| 2015 | J | jnl |
Informatica
|
| 2015 | J | jnl |
CoRR
|
| 2015 | — | conf |
3PGCIC
|
| 2015 | J | jnl |
Secur. Commun. Networks
|
| 2014 | J | jnl |
Fundam. Informaticae
|
| 2014 | J | jnl |
J. Medical Syst.
|
| 2014 | J | jnl |
J. Comput. Networks Commun.
|
| 2012 | J | jnl |
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci.
|
| 2009 | J | jnl |
Inf. Sci.
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IEEE Commun. Lett.
|
| 2009 | J | jnl |
Sci. China Ser. F Inf. Sci.
|
| 2009 | J | jnl |
IEEE Commun. Lett.
|
| 2008 | J | jnl |
IEEE Commun. Lett.
|
| 2008 | J | jnl |
Int. J. Netw. Secur.
|
| 2008 | J | jnl |
Int. J. Netw. Secur.
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | J | jnl |
Informatica
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | J | jnl |
CoRR
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | C | conf |
TAMC
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | — | conf |
IMSCCS (2)
|
| 2005 | C | conf |
CIT
|
| 2005 | J | jnl |
Appl. Math. Comput.
|
| 2005 | J | jnl |
J. Syst. Softw.
|
| 2005 | — | conf |
ISPA Workshops
|