| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
AMCIS
|
| 2016 | — | conf |
ICIA
|
| 2014 | J | jnl |
Int. J. Inf. Commun. Technol.
|
| 2014 | J | jnl |
Int. J. Netw. Secur.
|
| 2013 | J | jnl |
Inf. Technol. Control.
|
| 2013 | J | jnl |
Int. J. Commun. Syst.
|
| 2013 | J | jnl |
Int. Arab J. Inf. Technol.
|
| 2013 | J | jnl |
Peer-to-Peer Netw. Appl.
|
| 2013 | J | jnl |
Math. Comput. Model.
|
| 2013 | J | jnl |
Int. J. Ad Hoc Ubiquitous Comput.
|
| 2013 | J | jnl |
Secur. Commun. Networks
|
| 2013 | J | jnl |
Peer-to-Peer Netw. Appl.
|
| 2013 | J | jnl |
Int. J. Netw. Secur.
|
| 2013 | J | jnl |
Wirel. Pers. Commun.
|
| 2012 | J | jnl |
J. Medical Syst.
|
| 2012 | J | jnl |
J. Medical Syst.
|
| 2012 | J | jnl |
Int. J. Netw. Secur.
|
| 2012 | J | jnl |
Int. J. Electron. Secur. Digit. Forensics
|
| 2012 | J | jnl |
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci.
|
| 2012 | J | jnl |
Math. Comput. Model.
|
| 2012 | J | jnl |
Secur. Commun. Networks
|
| 2012 | J | jnl |
Int. Arab J. Inf. Technol.
|
| 2011 | J | jnl |
Int. J. Netw. Manag.
|
| 2011 | J | jnl |
J. Inf. Sci. Eng.
|
| 2011 | J | jnl |
Int. Arab J. Inf. Technol.
|
| 2011 | J | jnl |
J. Inf. Sci. Eng.
|
| 2010 | J | jnl |
IEEE Commun. Lett.
|
| 2010 | J | jnl |
IEEE Commun. Lett.
|
| 2009 | C | conf |
ISPEC
|
| 2009 | J | jnl |
J. Networks
|
| 2009 | — | conf |
APWeb/WAIM
|
| 2009 | J | jnl |
J. Networks
|
| 2008 | — | conf |
Financial Cryptography
|
| 2008 | C | conf |
NPC
|
| 2008 | C | conf |
NPC
|
| 2008 | J | jnl |
Int. J. Netw. Secur.
|
| 2007 | C | conf |
CIS
|
| 2006 | — | conf |
MSN
|
| 2006 | C | conf |
CIS
|
| 2006 | — | conf |
IMSCCS (2)
|