The SCEAS System
Navigation Menu

Journals and Conferences that author prefers


Hideki Imai: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Journals

  1. CoRR (8 paper(s))
  2. IEEE Transactions on Information Theory (7 paper(s))
  3. Des. Codes Cryptography (4 paper(s))
  4. IEICE Transactions (3 paper(s))
  5. IEEE Journal on Selected Areas in Communications (3 paper(s))
  6. IEEE Trans. Computers (3 paper(s))
  7. Comput. J. (2 paper(s))
  8. IEEE Transactions on Communications (2 paper(s))
  9. Computing (1 paper(s))
  10. Discrete Applied Mathematics (1 paper(s))
  11. Inf. Comput. (1 paper(s))
  12. Inf. Process. Lett. (1 paper(s))
  13. Theor. Comput. Sci. (1 paper(s))
  14. Appl. Algebra Eng. Commun. Comput. (1 paper(s))
  15. Computer Communications (1 paper(s))

Conferences

  1. (33 paper(s))
  2. ASIACRYPT (19 paper(s))
  3. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC) (17 paper(s))
  4. Public Key Cryptography (PKC) (9 paper(s))
  5. Australasian Conference on Information Security and Privacy (ACISP) (8 paper(s))
  6. Information Security Conference / Workshop (ISC/ISW) (8 paper(s))
  7. International Conference on Information and Communication Security (ICICS) (8 paper(s))
  8. EUROCRYPT (6 paper(s))
  9. Applied Cryptography and Network Security (6 paper(s))
  10. International Crytology Conference (CRYPTO) (5 paper(s))
  11. Fast Software Encryption (FSE) (3 paper(s))
  12. The Cryptographer's Track at RSA Conference (CT-RSA) (3 paper(s))
  13. INDOCRYPT (3 paper(s))
  14. Knowledge-Based Intelligent Information & Engineering Systems (2 paper(s))
  15. (2 paper(s))
  16. Cryptology and Network Security (2 paper(s))
  17. Conference on Computer and Communications Security (CCS) (2 paper(s))
  18. (2 paper(s))
  19. (1 paper(s))
  20. IEEE INFOCOM (1 paper(s))
  21. Computational and Information Science (1 paper(s))
  22. European Public Key Infrastructure Workshop (1 paper(s))
  23. International Conference on Biometrics (1 paper(s))
  24. Financial Cryptography (1 paper(s))
  25. Latin American Theoretical INformatics (LATIN) (1 paper(s))
  26. (1 paper(s))
  27. AES (Candidate) Conference (1 paper(s))
  28. International Conference on Foundations of Data Organization and Algorithms (FODO) (1 paper(s))
  29. Mathematical Methods, Models, and Architectures for Network Security Systems (MMM-ACNS) (1 paper(s))
  30. Architektur von Rechensystemen (1 paper(s))
  31. Inf. Conf. on Cryptology in Malaysia (1 paper(s))
  32. International Colloquium on Automata, Languages and Programming (ICALP) (1 paper(s))
  33. (1 paper(s))
  34. International Conference on Enterprise Information Systems (ICEIS) (1 paper(s))
  35. Selected Areas in Cryptography (SAC) (1 paper(s))
  36. Security in Communication Networks (1 paper(s))
  37. Conference on Information Security and Cryptology (1 paper(s))
  38. Information Security and Cryptology (ICISC) (1 paper(s))
  39. (1 paper(s))
  40. International Conference on Information Systems Security (1 paper(s))
  41. Workshop on Information Security Applications (1 paper(s))
  42. International Conference on Networking (ICN) (1 paper(s))
  43. Worldwide Computing and Its Applications (WWCA) (1 paper(s))
  44. ACM Digital Rights Management Workshop (1 paper(s))
  45. IMA Conference on Cryptography and Coding (1 paper(s))
  46. (1 paper(s))
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002