The SCEAS System
Navigation Menu

Journals and Conferences that author prefers


Jean-Jacques Quisquater: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Journals

  1. Journal of Computer Security (3 paper(s))
  2. Des. Codes Cryptography (2 paper(s))
  3. Integration (2 paper(s))
  4. Inf. Process. Lett. (2 paper(s))
  5. J. Cryptology (2 paper(s))
  6. Computers & Graphics (1 paper(s))
  7. Parallel Processing Letters (1 paper(s))
  8. Computer Networks (1 paper(s))
  9. IEEE Trans. Computers (1 paper(s))
  10. IEEE Computer (1 paper(s))
  11. IEEE Trans. Circuits Syst. Video Techn. (1 paper(s))
  12. Discrete Applied Mathematics (1 paper(s))
  13. CoRR (1 paper(s))
  14. IEEE Design & Test of Computers (1 paper(s))
  15. Inf. Comput. (1 paper(s))
  16. J. Parallel Distrib. Comput. (1 paper(s))
  17. Journal of Systems Architecture (1 paper(s))
  18. IEEE Micro (1 paper(s))

Conferences

  1. (27 paper(s))
  2. International Crytology Conference (CRYPTO) (15 paper(s))
  3. Cryptographic Hardware and Embedded Systems (CHES) (13 paper(s))
  4. CARDIS (10 paper(s))
  5. EUROCRYPT (8 paper(s))
  6. Field-Programmable Logic and Applications (FPL) (7 paper(s))
  7. International Symposium on Information Technology (4 paper(s))
  8. The Cryptographer's Track at RSA Conference (CT-RSA) (4 paper(s))
  9. Information Security and Cryptology (ICISC) (3 paper(s))
  10. Information Hiding Workshop (3 paper(s))
  11. IMA Conference on Cryptography and Coding (3 paper(s))
  12. ASIACRYPT (3 paper(s))
  13. Public Key Cryptography (PKC) (3 paper(s))
  14. Security in Communication Networks (2 paper(s))
  15. International Conference on Information and Communication Security (ICICS) (2 paper(s))
  16. IEEE Security in Storage Workshop (2 paper(s))
  17. Storage and Retrieval for Image and Video Databases (SPIE) (2 paper(s))
  18. European Symposium on Research in Computer Security (ESORICS) (2 paper(s))
  19. Workshop on Enabling Technologies: Infrastracture for Collaborative Enterprises (WETICE) (2 paper(s))
  20. Conference on Computer and Communications Security (CCS) (2 paper(s))
  21. Information Security Conference / Workshop (ISC/ISW) (2 paper(s))
  22. (2 paper(s))
  23. Symposium on Field Programmable Gate Arrays (FPGA) (2 paper(s))
  24. IEEE Computer Security Foundations Workshop (CSFW) (2 paper(s))
  25. Selected Areas in Cryptography (SAC) (2 paper(s))
  26. Advanced Courses (1 paper(s))
  27. Design, Automation, and Test in Europe (1 paper(s))
  28. Information Security (1 paper(s))
  29. Applied Cryptography and Network Security (1 paper(s))
  30. ACM Digital Rights Management Workshop (1 paper(s))
  31. ACPC Conference (1 paper(s))
  32. European Conference on Multimedia Applications, Services and Techniques (ECMAST) (1 paper(s))
  33. Application-Specific Systems, Architectures, and Processors (1 paper(s))
  34. Research in Smart Cards (E-smart) (1 paper(s))
  35. Security Protocols Workshop (1 paper(s))
  36. INDOCRYPT (1 paper(s))
  37. International Parallel (and Distributed) Processing Symposium (IP(D)PS) (1 paper(s))
  38. Self-Stabilizing Systems (1 paper(s))
  39. EUROMICRO (1 paper(s))
  40. European Conference on Parallel Processing (Euro-Par) (1 paper(s))
  41. (1 paper(s))
  42. Conference on Information Security and Cryptology (1 paper(s))
  43. European Public Key Infrastructure Workshop (1 paper(s))
  44. Workshop on Power and Timing Modeling, Optimization and Simulation (PATMOS) (1 paper(s))
  45. (1 paper(s))
  46. COST 237 Workshops (1 paper(s))
  47. Algebraic Coding (1 paper(s))
  48. ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC) (1 paper(s))
  49. Fast Software Encryption (FSE) (1 paper(s))
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002