The SCEAS System
Navigation Menu

Journals and Conferences that author prefers


Jongin Lim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Journals

  1. IEEE Trans. Computers (2 paper(s))
  2. Inf. Process. Lett. (1 paper(s))
  3. J. Comput. Syst. Sci. (1 paper(s))
  4. J. Cryptology (1 paper(s))
  5. Discrete Mathematics (1 paper(s))

Conferences

  1. (6 paper(s))
  2. Fast Software Encryption (FSE) (5 paper(s))
  3. Computational Science and Its Applications (4 paper(s))
  4. Information Security and Cryptology (ICISC) (4 paper(s))
  5. Australasian Conference on Information Security and Privacy (ACISP) (3 paper(s))
  6. Selected Areas in Cryptography (SAC) (3 paper(s))
  7. Computational and Information Science (3 paper(s))
  8. Asia-Pacific Web Conference (2 paper(s))
  9. (2 paper(s))
  10. ASIACRYPT (2 paper(s))
  11. Public Key Cryptography (PKC) (2 paper(s))
  12. International Conference on Information and Communication Security (ICICS) (2 paper(s))
  13. (2 paper(s))
  14. Information Security Practice and Experience (2 paper(s))
  15. Information Security Conference / Workshop (ISC/ISW) (2 paper(s))
  16. International Conference on Computational Science (ICCS) (1 paper(s))
  17. European Conference on Parallel Processing (Euro-Par) (1 paper(s))
  18. Knowledge-Based Intelligent Information & Engineering Systems (1 paper(s))
  19. Wired/Wireless Internet Communications (1 paper(s))
  20. Advanced Information Networking and Applications (1 paper(s))
  21. European Public Key Infrastructure Workshop (1 paper(s))
  22. Mathematical Methods, Models, and Architectures for Network Security Systems (MMM-ACNS) (1 paper(s))
  23. (1 paper(s))
  24. OTM Conferences / Workshops (1 paper(s))
  25. Cryptology and Network Security (1 paper(s))
  26. International Conference on Testing Communicating Systems (TestCom) (1 paper(s))
  27. CARDIS (1 paper(s))
  28. Cryptographic Hardware and Embedded Systems (CHES) (1 paper(s))
  29. Intelligent Data Engineering and Automated Learning (IDEAL) (1 paper(s))
  30. (1 paper(s))
  31. IFIP WG6.8 Publications (1 paper(s))
  32. Text, Speech and Dialogue (TSD) (1 paper(s))
  33. Communications and Multimedia Security (1 paper(s))
  34. Information Hiding Workshop (1 paper(s))
  35. Workshop on Information Security Applications (1 paper(s))
  36. International Crytology Conference (CRYPTO) (1 paper(s))
  37. INDOCRYPT (1 paper(s))
  38. (1 paper(s))
  39. Distributed Applications and Interoperable Systems (1 paper(s))
  40. International Symposium on Computer and Information Sciences (ISCIS) (1 paper(s))
  41. Database and Expert Systems Applications (DEXA) (1 paper(s))
  42. (1 paper(s))
  43. EUROCRYPT (1 paper(s))
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002