The SCEAS System
Navigation Menu

Journals and Conferences that author prefers


Yi Mu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Journals

  1. Informatica (Slovenia) (1 paper(s))
  2. Theor. Comput. Sci. (1 paper(s))
  3. J. Comput. Sci. Technol. (1 paper(s))
  4. IEEE Computer Graphics and Applications (1 paper(s))
  5. Computers & Security (1 paper(s))

Conferences

  1. (37 paper(s))
  2. Australasian Conference on Information Security and Privacy (ACISP) (11 paper(s))
  3. International Conference on Information and Communication Security (ICICS) (6 paper(s))
  4. Embedded and Ubiquitous Computing (5 paper(s))
  5. Annual Computer Security Applications Conference (5 paper(s))
  6. Advanced Information Networking and Applications (5 paper(s))
  7. (4 paper(s))
  8. Information Security Practice and Experience (3 paper(s))
  9. Mobile Sensor Networks (3 paper(s))
  10. Information Security and Cryptology (ICISC) (3 paper(s))
  11. Cryptology and Network Security (3 paper(s))
  12. INDOCRYPT (3 paper(s))
  13. Applied Cryptography and Network Security (2 paper(s))
  14. Information Security Conference / Workshop (ISC/ISW) (2 paper(s))
  15. European Public Key Infrastructure Workshop (2 paper(s))
  16. Financial Cryptography (2 paper(s))
  17. (2 paper(s))
  18. Computational Science and Its Applications (2 paper(s))
  19. (2 paper(s))
  20. (2 paper(s))
  21. Asian Computing Science Conference (ASIAN) (2 paper(s))
  22. International Conference on Parallel and Distributed Systems (ICPADS) (2 paper(s))
  23. (2 paper(s))
  24. (1 paper(s))
  25. DEXA Workshops (1 paper(s))
  26. (1 paper(s))
  27. ACIS International Conference on Computer and Information Science (1 paper(s))
  28. International Workshop on Distributed Computing (IWDC) (1 paper(s))
  29. Computational and Information Science (1 paper(s))
  30. ACSW Frontiers (1 paper(s))
  31. Public Key Cryptography (PKC) (1 paper(s))
  32. Australasian Database Conference (ADC) (1 paper(s))
  33. IEEE Conference on Local Computer Networks (LCN) (1 paper(s))
  34. Advanced Industrial Conference on Telecommunications (1 paper(s))
  35. ACM Symposium on Applied Computing (SAC) (1 paper(s))
  36. Security in Communication Networks (1 paper(s))
  37. IFIP World Computer Congress (1 paper(s))
  38. Information Security (1 paper(s))
  39. IMA Conference on Cryptography and Coding (1 paper(s))
  40. Trust and Privacy in Digital Business (1 paper(s))
  41. Conference on Computer and Communications Security (CCS) (1 paper(s))
  42. Security and Management (SAM) (1 paper(s))
  43. International Symposium on Algorithms and Computation (ISAAC) (1 paper(s))
  44. (1 paper(s))
  45. The Cryptographer's Track at RSA Conference (CT-RSA) (1 paper(s))
  46. International Symposium on Electronic Commerce (ISEC) (1 paper(s))
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002