2023
|
Published In
Computer Systems Science and Engineering
|
2023
|
Published In
Computer Standards and Interfaces
|
2023
|
Published In
IEEE Transactions on Information Forensics and Security
|
2023
|
Published In
IEEE Transactions on Parallel and Distributed Systems
|
2023
|
Published In
Information Sciences
|
2022
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2022
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2022
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2022
|
Published In
Computer Standards and Interfaces
|
2022
|
Published In
Information and Software Technology
|
2022
|
Published In
Theoretical Computer Science
|
2022
|
Published In
Computers and Security
|
2022
|
Published In
SN Applied Sciences
|
2022
|
Published In
IEEE Transactions on Information Forensics and Security
|
2022
|
Published In
IEEE Transactions on Cloud Computing
|
2022
|
Published In
IEEE Transactions on Information Forensics and Security
|
2022
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2022
|
Published In
IEEE Transactions on Cloud Computing
|
2022
|
Published In
IEEE Transactions on Cloud Computing
|
2022
|
Published In
Theoretical Computer Science
|
2022
|
Published In
IEEE Transactions on Services Computing
|
2022
|
Published In
IEEE Transactions on Services Computing
|
2022
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2022
|
Published In
Journal of Imaging
|
2022
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2022
|
Published In
Computer Standards and Interfaces
|
2022
|
Published In
Computers and Security
|
2022
|
Published In
Cryptography
|
2022
|
Published In
Information Sciences
|
2022
|
Published In
Computer Standards and Interfaces
|
2022
|
Published In
COMPUTER JOURNAL
|
2022
|
Published In
Science China Information Sciences
|
2022
|
Published In
Theoretical Computer Science
|
2022
|
Published In
Computer Standards and Interfaces
|
2022
|
Published In
Journal of Computer Virology and Hacking Techniques
|
2022
|
Published In
IEEE Transactions on Cloud Computing
|
2022
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2022
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2022
|
Published In
Computer Standards and Interfaces
|
2022
|
Published In
Theoretical Computer Science
|
2022
|
Published In
Theoretical Computer Science
|
2022
|
Published In
IEEE Transactions on Information Forensics and Security
|
2022
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2022
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2022
|
Published In
IEEE Internet of Things Journal
|
2022
|
Published In
Wireless Communications and Mobile Computing
|
2022
|
Published In
IEEE Transactions on Information Forensics and Security
|
2022
|
Published In
IEEE Transactions on Software Engineering
|
2022
|
Published In
IEEE Transactions on Emerging Topics in Computing
|
2022
|
Published In
IEEE Transactions on Computers
|
2022
|
Published In
International Journal of Intelligent Systems
|
2022
|
Published In
Journal of imaging
|
2022
|
Published In
Theoretical Computer Science
|
2021
|
Published In
Theoretical Computer Science
|
2021
|
Published In
Information Sciences
|
2021
|
Published In
Chinese Journal of Electronics
|
2021
|
Published In
Computer Standards and Interfaces
|
2021
|
Published In
Computer Standards and Interfaces
|
2021
|
Published In
IEEE Transactions on Services Computing
|
2021
|
Published In
Science China Information Sciences
|
2021
|
Published In
Theoretical Computer Science
|
2021
|
Published In
Computer Systems Science and Engineering
|
2021
|
Published In
Computer Standards and Interfaces
|
2021
|
|
2021
|
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2021
|
Published In
Science China Information Sciences
|
2021
|
Published In
Theoretical Computer Science
|
2021
|
|
2021
|
Published In
IEEE Transactions on Network Science and Engineering
|
2021
|
Published In
Computer Standards and Interfaces
|
2021
|
Published In
Computer Journal
|
2021
|
Published In
International Journal of Intelligent Systems
|
2021
|
Published In
COMPUTER JOURNAL
|
2021
|
Published In
IEEE Transactions on Services Computing
|
2021
|
Published In
IEEE Transactions on Parallel and Distributed Systems
|
2021
|
Published In
IEEE Transactions on Information Forensics and Security
|
2021
|
Published In
IEEE Transactions on Knowledge and Data Engineering
|
2021
|
Published In
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
|
2021
|
Published In
IEEE Transactions on Vehicular Technology
|
2021
|
Published In
IEEE Wireless Communications
|
2021
|
|
2021
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2021
|
Published In
Journal of Network and Computer Applications
|
2020
|
Published In
Computer Journal
|
2020
|
|
2020
|
Published In
Journal of Information Security and Applications
|
2020
|
Published In
Information (Switzerland)
|
2020
|
Published In
Journal of Network and Computer Applications
|
2020
|
Published In
Theoretical Computer Science
|
2020
|
|
2020
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2020
|
Published In
IEEE Transactions on Emerging Topics in Computing
|
2020
|
Published In
IEEE Transactions on Reliability
|
2020
|
Published In
Computer Journal
|
2020
|
Published In
IEEE Internet of Things Journal
|
2020
|
Published In
Information Sciences
|
2020
|
Published In
Information Sciences
|
2020
|
Published In
Information Sciences
|
2020
|
Published In
Computers and Security
|
2020
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2020
|
Published In
Information Sciences
|
2020
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2020
|
Published In
Computer Journal
|
2020
|
Published In
Journal of Internet Services and Information Security
|
2020
|
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2020
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2020
|
Published In
Information Sciences
|
2020
|
Published In
IEEE Transactions on Services Computing
|
2020
|
Published In
Computer Journal
|
2020
|
Published In
IEEE Internet of Things Journal
|
2020
|
Published In
IEEE Systems Journal
|
2020
|
Published In
IACR Cryptol. ePrint Arch.
|
2020
|
Published In
Theoretical Computer Science
|
2020
|
Published In
Theoretical Computer Science
|
2020
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2020
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2020
|
Published In
Journal of Mathematical Cryptology
|
2020
|
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2019
|
Published In
Lecture Notes in Computer Science
|
2019
|
Published In
IEEE Internet of Things Journal
|
2019
|
|
2019
|
Published In
Lecture Notes in Computer Science
|
2019
|
Published In
Information Sciences
|
2019
|
|
2019
|
Published In
International Journal of Information Security
|
2019
|
Published In
Lecture Notes in Computer Science
|
2019
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019
|
Published In
International Journal of Information Security
|
2019
|
Published In
Journal of Computer Security
|
2019
|
Published In
Information Sciences
|
2019
|
Published In
Lecture Notes in Computer Science
|
2019
|
Published In
The Computer Journal
|
2019
|
|
2019
|
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2019
|
Published In
Journal of Mathematical Cryptology
|
2019
|
Published In
Information Sciences
|
2019
|
Published In
Information Sciences
|
2019
|
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2019
|
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2019
|
Published In
Information Sciences
|
2019
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019
|
Published In
Lecture Notes in Computer Science
|
2019
|
Published In
Journal of Cryptologic Research
|
2019
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019
|
Published In
Theoretical Computer Science
|
2019
|
Published In
Lecture Notes in Computer Science
|
2019
|
Published In
IET Information Security
|
2019
|
|
2019
|
Published In
Wireless Personal Communications: an international journal
|
2019
|
Published In
SN Applied Sciences
|
2019
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019
|
|
2019
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019
|
Published In
Security and Communication Networks
|
2019
|
Published In
Designs, Codes and Cryptography
|
2019
|
|
2019
|
Published In
Lecture Notes in Computer Science
|
2019
|
Published In
Journal of Information and Optimization Sciences
|
2019
|
Published In
Journal of Computer Science and Technology
|
2019
|
Published In
IEEE Network
|
2019
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019
|
Published In
Journal of Universal Computer Science
|
2019
|
Published In
Information Sciences
|
2018
|
Published In
Designs, Codes and Cryptography
|
2018
|
Published In
Information Sciences
|
2018
|
|
2018
|
Published In
Information Sciences
|
2018
|
Published In
IEEE Transactions on Vehicular Technology
|
2018
|
Published In
Lecture Notes in Computer Science
|
2018
|
|
2018
|
Published In
International Journal of Information Security
|
2018
|
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2018
|
Published In
Information Sciences
|
2018
|
|
2018
|
Published In
The Computer Journal
|
2018
|
Published In
Journal of Information Security and Applications
|
2018
|
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2018
|
Published In
Computers and Security
|
2018
|
Published In
IEEE Transactions on Services Computing
|
2018
|
Published In
Designs, Codes and Cryptography
|
2018
|
Published In
The Computer Journal
|
2018
|
Published In
IEEE Transactions on Industrial Informatics
|
2018
|
Published In
Personal and Ubiquitous Computing
|
2018
|
Published In
Journal of Information Security and Applications
|
2018
|
Published In
IEEE Transactions on Services Computing
|
2018
|
Published In
Theoretical Computer Science
|
2018
|
Published In
Information Sciences
|
2018
|
Published In
Information Sciences
|
2018
|
Published In
IEEE Transactions on Vehicular Technology
|
2018
|
Published In
International Journal of Information Security
|
2018
|
Published In
Information Sciences
|
2017
|
Published In
Lecture Notes in Computer Science
|
2017
|
Published In
Journal of Computer and System Sciences
|
2017
|
Published In
Lecture Notes in Computer Science
|
2017
|
Published In
Theoretical Computer Science
|
2017
|
Published In
Designs, Codes and Cryptography
|
2017
|
Published In
Lecture Notes in Computer Science
|
2017
|
Published In
The Computer Journal
|
2017
|
Published In
IEEE Transactions on Information Forensics and Security
|
2017
|
Published In
Computer Standards and Interfaces
|
2017
|
Published In
Personal and Ubiquitous Computing
|
2017
|
Published In
Communications in Computer and Information Science
|
2017
|
Published In
Journal of Applied Mathematics and Computing
|
2017
|
Published In
Lecture Notes in Artificial Intelligence
|
2017
|
Published In
International Journal of Information Security
|
2017
|
Published In
Personal and Ubiquitous Computing
|
2017
|
Published In
Computer Standards and Interfaces
|
2017
|
Published In
Lecture Notes in Electrical Engineering
|
2017
|
Published In
Lecture Notes in Computer Science
|
2017
|
|
2017
|
Published In
IEEE Transactions on Information Forensics and Security
|
2017
|
Published In
Lecture Notes in Computer Science
|
2017
|
Published In
Computer Standards and Interfaces
|
2017
|
Published In
International Journal of Foundations of Computer Science
|
2017
|
Published In
Journal of Computer and System Sciences
|
2017
|
|
2017
|
Published In
ACM Transactions on Embedded Computing Systems
|
2017
|
Published In
Journal of Information Security and Applications
|
2017
|
Published In
Designs, Codes and Cryptography
|
2017
|
Published In
Journal of Software Networking
|
2017
|
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2016
|
Published In
The Computer Journal
|
2016
|
Published In
Lecture Notes in Computer Science
|
2016
|
Published In
International Journal of Communication Systems
|
2016
|
Published In
Security and Communication Networks
|
2016
|
Published In
IEEE Transactions on Information Forensics and Security
|
2016
|
Published In
Electronic Commerce Research and Applications
|
2016
|
Published In
Lecture Notes in Computer Science
|
2016
|
Published In
International Journal of Information Security
|
2016
|
Published In
Journal of Internet Services and Information Security
|
2016
|
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2016
|
Published In
IEEE Transactions on Information Forensics and Security
|
2016
|
Published In
IEEE Transactions on Information Forensics and Security
|
2016
|
Published In
Lecture Notes in Computer Science
|
2016
|
Published In
The Computer Journal
|
2016
|
Published In
Lecture Notes in Computer Science
|
2016
|
Published In
The Computer Journal
|
2016
|
Published In
IEEE Transactions on Dependable and Secure Computing
|
2016
|
Published In
IEEE Transactions on Information Forensics and Security
|
2016
|
Published In
Bulletin of Mathematical Sciences and Applications
|
2016
|
Published In
IEEE Transactions on Information Forensics and Security
|
2016
|
Published In
International Journal of Information Security
|
2016
|
|
2016
|
Published In
International Journal of Medical Engineering and Informatics
|
2016
|
Published In
Lecture Notes in Computer Science
|
2016
|
Published In
Security and Communication Networks
|
2016
|
Published In
IEEE Transactions on Information Forensics and Security
|
2016
|
Published In
Lecture Notes in Computer Science
|
2016
|
Published In
Journal of Computer and System Sciences
|
2016
|
Published In
Lecture Notes in Computer Science
|
2016
|
Published In
IEEE Transactions on Computers
|
2015
|
Published In
Concurrency and Computation: Practice and Experience
|
2015
|
Published In
IEEE Transactions on Information Forensics and Security
|
2015
|
Published In
Security and Communication Networks
|
2015
|
Published In
Security and Communication Networks
|
2015
|
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2015
|
Published In
Computer Standards and Interfaces
|
2015
|
Published In
Health Information Management Journal
|
2015
|
Published In
Health Information Management Journal
|
2015
|
Published In
IEEE Transactions on Information Forensics and Security
|
2015
|
Published In
Security and Communication Networks
|
2015
|
Published In
IEEE Transactions on Information Forensics and Security
|
2015
|
Published In
Theoretical Computer Science
|
2015
|
Published In
Lecture Notes in Computer Science
|
2015
|
Published In
The Computer Journal
|
2015
|
Published In
Wireless Personal Communications: an international journal
|
2015
|
Published In
Lecture Notes in Computer Science
|
2015
|
Published In
Science China Information Sciences
|
2015
|
Published In
Theoretical Computer Science
|
2015
|
Published In
The Computer Journal
|
2015
|
Published In
Lecture Notes in Computer Science
|
2015
|
Published In
International Journal of Information Security
|
2015
|
Published In
Lecture Notes in Computer Science
|
2015
|
Published In
International Journal of High Performance Computing and Networking
|
2015
|
Published In
IEEE Transactions on Information Forensics and Security
|
2015
|
Published In
Information Sciences
|
2015
|
Published In
Information Sciences
|
2015
|
Published In
IEEE Transactions on Information Forensics and Security
|
2015
|
Published In
Designs, Codes and Cryptography
|
2015
|
Published In
IET Information Security
|
2015
|
Published In
EAI Endorsed Transactions on Security and Safety
|
2015
|
Published In
Theoretical Computer Science
|
2015
|
Published In
IEEE Transactions on Information Forensics and Security
|
2015
|
Published In
Theoretical Computer Science
|
2015
|
Published In
International Journal of Computational Science and Engineering
|
2015
|
Published In
Lecture Notes in Computer Science
|
2015
|
Published In
The Computer Journal
|
2015
|
Published In
IEEE Transactions on Information Forensics and Security
|
2015
|
Published In
The Computer Journal
|
2015
|
Published In
IEEE Network: the magazine of global information exchange
|
2015
|
Published In
Computer Standards and Interfaces
|
2015
|
Published In
IEEE Transactions on Computers
|
2014
|
Published In
Concurrency and Computation: Practice and Experience
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
IEEE Transactions on Information Forensics and Security
|
2014
|
Published In
IEEE Transactions on Vehicular Technology
|
2014
|
Published In
Security and Communication Networks
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
Journal of Internet Technology
|
2014
|
Published In
The Computer Journal
|
2014
|
Published In
Theoretical Computer Science
|
2014
|
Published In
IEEE Transactions on Information Forensics and Security
|
2014
|
Published In
IEEE Transactions on Information Forensics and Security
|
2014
|
Published In
Journal of Supercomputing
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
Security and Communication Networks
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2014
|
Published In
Theoretical Computer Science
|
2014
|
Published In
Information Sciences
|
2014
|
Published In
IEEE Transactions on Computers
|
2014
|
Published In
Expert Systems with Applications
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
IEEE Transactions on Knowledge and Data Engineering
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2014
|
Published In
Computers and Security
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
Lecture Notes in Computer Science
|
2014
|
Published In
IEEE Transactions on Information Forensics and Security
|
2014
|
Published In
Information Processing Letters
|
2014
|
Published In
IEEE Transactions on Information Forensics and Security
|
2014
|
Published In
Journal of Computer Security
|
2014
|
Published In
Lecture Notes in Computer Science
|
2013
|
Published In
Wireless Personal Communications: an international journal
|
2013
|
|
2013
|
Published In
Lecture Notes in Computer Science
|
2013
|
Published In
IEEE Systems Journal
|
2013
|
Published In
The Computer Journal
|
2013
|
Published In
Lecture Notes in Computer Science
|
2013
|
Published In
IEEE Transactions on Information Forensics and Security
|
2013
|
Published In
Information Sciences
|
2013
|
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2013
|
Published In
Lecture Notes in Computer Science
|
2013
|
Published In
Lecture Notes in Computer Science
|
2013
|
Published In
Lecture Notes in Computer Science
|
2013
|
Published In
Information Sciences
|
2013
|
Published In
IEEE Transactions on Information Forensics and Security
|
2013
|
Published In
Lecture Notes in Computer Science
|
2013
|
Published In
Theoretical Computer Science
|
2013
|
Published In
Lecture Notes in Computer Science
|
2013
|
Published In
Journal of Network and Computer Applications
|
2013
|
Published In
Information Security Technical Report
|
2013
|
Published In
Information Sciences
|
2013
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
International Journal of Information Security
|
2012
|
Published In
The Computer Journal
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
The Computer Journal
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
The Computer Journal
|
2012
|
Published In
Theoretical Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
IEEE Transactions on Information Forensics and Security
|
2012
|
Published In
Computers and Mathematics with Applications
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Computer Standards and Interfaces
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
International Journal of Information Security
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Journal of Network and Computer Applications
|
2012
|
Published In
Software: Practice and Experience
|
2012
|
Published In
IEEE Transactions on Parallel and Distributed Systems
|
2012
|
Published In
Mathematical and Computer Modelling
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Control and Cybernetics
|
2012
|
Published In
Journal of Systems and Software
|
2012
|
Published In
Lecture Notes in Computer Science
|
2012
|
Published In
Lecture Notes in Computer Science
|
2011
|
Published In
Lecture Notes in Computer Science
|
2011
|
Published In
Lecture Notes in Computer Science
|
2011
|
Published In
Lecture Notes in Computer Science
|
2011
|
Published In
IEEE Transactions on Information Forensics and Security
|
2011
|
Published In
International Journal of Information Security
|
2011
|
Published In
Lecture Notes in Computer Science
|
2011
|
Published In
Information Sciences
|
2011
|
Published In
Journal of Systems and Software
|
2011
|
Published In
Theoretical Computer Science
|
2011
|
Published In
Lecture Notes in Computer Science
|
2011
|
Published In
Journal of Systems and Software
|
2011
|
Published In
IEEE Journal on Selected Areas in Communications
|
2011
|
Published In
Journal of Computer Security
|
2011
|
Published In
IEEE Transactions on Information Forensics and Security
|
2011
|
Published In
Computers and Mathematics with Applications
|
2010
|
Published In
Lecture Notes in Computer Science
|
2010
|
Published In
Lecture Notes in Computer Science
|
2010
|
Published In
Journal of Medical Systems
|
2010
|
Published In
Information Sciences
|
2010
|
Published In
Journal of Digital Content Technology and its Applications
|
2010
|
Published In
Journal of Computer Security
|
2010
|
Published In
International Journal of Computers, Communications and Control
|
2010
|
Published In
Lecture Notes in Computer Science
|
2010
|
Published In
Lecture Notes in Computer Science
|
2010
|
Published In
International Journal of Security and its Applications
|
2010
|
Published In
International Journal of Security and Its Applications
|
2010
|
Published In
International Journal of Technology Assessment in Health Care
|
2010
|
Published In
International Journal of Information Security
|
2010
|
Published In
Lecture Notes in Computer Science
|
2010
|
Published In
Lecture Notes in Computer Science
|
2010
|
Published In
Lecture Notes in Computer Science
|
2010
|
Published In
Lecture Notes in Computer Science
|
2010
|
Published In
Lecture Notes in Computer Science
|
2010
|
Published In
Journal of Systems and Software
|
2009
|
Published In
International Journal of Applied Cryptography
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Lecture notes in computer science
|
2009
|
Published In
Journal of Universal Computer Science
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science)
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
Lecture Notes in Computer Science
|
2009
|
Published In
IEICE Electronics Express
|
2009
|
Published In
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
|
2009
|
Published In
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
|
2009
|
Published In
Theoretical Computer Science
|
2008
|
Published In
International Journal of Network Security (IJNS)
|
2008
|
Published In
Journal of Computational Information Systems
|
2008
|
Published In
Journal of Computer Science and Technology
|
2008
|
Published In
Journal of Universal Computer Science
|
2008
|
Published In
International Journal of Applied Cryptography
|
2008
|
Published In
Information Sciences
|
2008
|
Published In
International Journal of Information Security
|
2008
|
Published In
Lecture Notes in Computer Science
|
2008
|
Published In
International Journal of Network Security
|
2007
|
Published In
Lecture Notes in Computer Science
|
2007
|
Published In
Chinese Journal of Electronics
|
2007
|
|
2007
|
Published In
Journal of Computer Science and Technology
|
2007
|
Published In
Lecture Notes in Computer Science
|
2007
|
Published In
Lecture notes in computer science
|
2007
|
Published In
Lecture notes in computer science
|
2007
|
Published In
IET Information Security
|
2007
|
Published In
Lecture Notes in Computer Science
|
2007
|
Published In
International Journal of Network Security (IJNS)
|
2007
|
Published In
Conferences in Research and Practice in Information Technology
|
2007
|
Published In
Conferences in Research and Practice in Information Technology Series
|
2007
|
Published In
Lecture notes in computer science
|
2007
|
Published In
International Journal of Wireless and Mobile Computing
|
2007
|
Published In
Journal of Computer Science and Technology
|
2007
|
Published In
International Journal of Mobile Communications
|
2007
|
Published In
Journal of Medical Systems
|
2007
|
Published In
Journal of Computer Science and Technology
|
2004
|
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
1999
|
Published In
Electronics Letters
|