The SCEAS System
Navigation Menu

Journals and Conferences that author prefers


Reihaneh Safavi-Naini: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Journals

  1. Des. Codes Cryptography (6 paper(s))
  2. IEEE Transactions on Information Theory (5 paper(s))
  3. Comput. J. (3 paper(s))
  4. CoRR (3 paper(s))
  5. J. UCS (3 paper(s))
  6. Inf. Comput. (2 paper(s))
  7. Journal of Research and Practice in Information Technology (1 paper(s))
  8. Multimedia Syst. (1 paper(s))
  9. Ars Comb. (1 paper(s))
  10. SIAM J. Discrete Math. (1 paper(s))
  11. Theor. Comput. Sci. (1 paper(s))
  12. Computer Networks (1 paper(s))
  13. IEEE Transactions on Image Processing (1 paper(s))
  14. Data Knowl. Eng. (1 paper(s))
  15. Computer Communications (1 paper(s))
  16. Int. J. Comput. Math. (1 paper(s))
  17. Electr. Notes Theor. Comput. Sci. (1 paper(s))
  18. Int. J. Found. Comput. Sci. (1 paper(s))
  19. Int. J. Inf. Sec. (1 paper(s))
  20. J. Comb. Theory, Ser. B (1 paper(s))
  21. J. Inf. Sci. Eng. (1 paper(s))

Conferences

  1. (27 paper(s))
  2. Australasian Conference on Information Security and Privacy (ACISP) (23 paper(s))
  3. ASIACRYPT (10 paper(s))
  4. Conference on Computer and Communications Security (CCS) (9 paper(s))
  5. Information Security Conference / Workshop (ISC/ISW) (7 paper(s))
  6. INDOCRYPT (6 paper(s))
  7. Applied Cryptography and Network Security (5 paper(s))
  8. EUROCRYPT (5 paper(s))
  9. Information Security and Cryptology (ICISC) (5 paper(s))
  10. Public Key Cryptography (PKC) (4 paper(s))
  11. ACM Digital Rights Management Workshop (3 paper(s))
  12. International Workshop on Digital Watermarking (3 paper(s))
  13. Cryptology and Network Security (3 paper(s))
  14. IEEE Pacific Rim Conference on Multimedia (3 paper(s))
  15. Privacy Enhancing Technologies (3 paper(s))
  16. Computing and Combinatorics (COCOON) (3 paper(s))
  17. International Conference on Information and Communication Security (ICICS) (3 paper(s))
  18. (2 paper(s))
  19. Annual Computer Security Applications Conference (2 paper(s))
  20. Workshop on Information Security Applications (1 paper(s))
  21. IEEE Computer Security Foundations Workshop (CSFW) (1 paper(s))
  22. International Conference on Parallel Processing (ICPP) - Workshops (1 paper(s))
  23. Database and Expert Systems Applications (DEXA) (1 paper(s))
  24. International Conference on Deductive and Object-Oriented Databases (DOOD) (1 paper(s))
  25. Information Security Practice and Experience (1 paper(s))
  26. ACSW Frontiers (1 paper(s))
  27. Australasian Database Conference (ADC) (1 paper(s))
  28. International Conference on Conceptual Modeling (ER) (1 paper(s))
  29. (1 paper(s))
  30. Financial Cryptography (1 paper(s))
  31. Cryptographic Algorithms and their Uses (1 paper(s))
  32. Fast Software Encryption (FSE) (1 paper(s))
  33. International Colloquium on Automata, Languages and Programming (ICALP) (1 paper(s))
  34. Communications and Multimedia Security (1 paper(s))
  35. International Conference on Distributed Computing Systems (ICDCS) - Workshops (1 paper(s))
  36. Security in Communication Networks (1 paper(s))
  37. Information Security (1 paper(s))
  38. Cryptography: Policy and Algorithms (1 paper(s))
  39. European Workshop on Security in Ad-hoc and Sensor Networks (1 paper(s))
  40. International Crytology Conference (CRYPTO) (1 paper(s))
  41. International Conference on Multimedia and Expo (ICME) (1 paper(s))
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002