| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2013 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2012 | — | conf |
IMIS
|
| 2012 | J | jnl |
J. Netw. Comput. Appl.
|
| 2012 | J | jnl |
Comput. J.
|
| 2012 | J | jnl |
Comput. Commun.
|
| 2011 | Misc | conf |
CISIS
|
| 2011 | J | jnl |
J. Netw. Comput. Appl.
|
| 2011 | J | jnl |
J. Netw. Comput. Appl.
|
| 2011 | B | conf |
IWCMC
|
| 2011 | B | conf |
TrustCom
|
| 2011 | J | jnl |
J. Netw. Comput. Appl.
|
| 2011 | J | jnl |
Comput. J.
|
| 2011 | J | jnl |
J. Interconnect. Networks
|
| 2010 | C | conf |
EUC
|
| 2010 | B | conf |
AINA
|
| 2010 | J | jnl |
CoRR
|
| 2010 | — | conf |
ICC
|
| 2010 | B | conf |
AINA
|
| 2010 | C | conf |
iiWAS
|
| 2010 | C | conf |
EUC
|
| 2009 | — | conf |
MSN
|
| 2009 | — | conf |
CCNC
|
| 2009 | B | conf |
NSS
|
| 2009 | J | jnl |
IEEE Trans. Wirel. Commun.
|
| 2009 | J | jnl |
J. Syst. Archit.
|
| 2009 | C | conf |
SIN
|
| 2008 | — | conf |
EUC (2)
|
| 2008 | C | conf |
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains.
WOWMOM
|
| 2008 | — | conf |
NTMS
|
| 2008 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2008 | J | jnl |
Comput. Syst. Sci. Eng.
|
| 2007 | — | conf |
MSN
|
| 2007 | — | conf |
ICCSA (3)
|
| 2007 | J | jnl |
Int. J. Inf. Secur. Priv.
|
| 2007 | — | ch. |
E-Service Intelligence
|
| 2006 | — | conf |
SWS
|
| 2006 | J | jnl |
Inf. Manag. Comput. Secur.
|
| 2006 | J | jnl |
Res. Comput. Sci.
|
| 2006 | — | conf |
ICDE Workshops
|
| 2006 | B | conf |
LREC
|
| 2006 | — | conf |
AINA (1)
|
| 2006 | C | conf |
CIS
|
| 2005 | — | conf |
ICMB
|
| 2005 | — | conf |
CIS (2)
|
| 2005 | C | conf |
SEKE
|
| 2004 | — | conf |
ECUMN
|
| 2004 | C | conf |
IPCCC
|
| 2004 | — | conf |
International Conference on Computational Intelligence
|
| 2003 | A* | conf |
EC
|
| 2003 | C | conf |
IDEAL
|