PROXY SIGNER
Experts
- Zhenfu Cao
- Sunder Lal
- Amit K. Awasthi
- Jianhong Zhang
- G. P. Biswas
- SK Hafizul Islam
- Feng Cao
- Guilin Wang
- N. R. Sunitha
- B. B. Amberker
- Fangguo Zhang
- Jing Xu
- Mahmoud Salmasizadeh
- Shin-Jia Hwang
- Javier Herranz
- Kefei Chen
- Tianjie Cao
- Rongxing Lu
- Je Hong Park
- Zuo-Wen Tan
- Sahadeo Padhye
- Zhenfeng Zhang
- Xiangxue Li
- Jun Shao
- Vandani Verma
- Bo Gyeong Kang
- Dengguo Feng
- Qin Wang
- S. Sree Vivek
- Yi Mu
- Germán Sáez
- Chengcheng Yu
- Zhengping Jin
- Feng Bao
- Hu Xiong
- Christian Hanser
- Adriana Palacio
- Chuang Ma
- S. Sharmila Deva Selvi
Venues
- IACR Cryptol. ePrint Arch.
- Appl. Math. Comput.
- Int. J. Netw. Secur.
- Security and Management
- IMSCCS (2)
- Int. J. Commun. Syst.
- J. Comput. Sci. Technol.
- NSS
- ACISP
- INDOCRYPT
- Inf. Sci.
- CIS (2)
- Comput. Electr. Eng.
- J. King Saud Univ. Comput. Inf. Sci.
- IEEE Access
- SECRYPT
- Entropy
- CoRR
- Informatica
- Inf. Process. Lett.
- ICICS
- ISPA Workshops
- INCoS
- Comput. Commun.
- Int. J. Embed. Syst.
- InfoSecu
- CIS
- J. Syst. Softw.
- WISA
- WISTP
- ACITY (1)
- ICITCS
- Comput. J.
- ICIT
- Secure Data Management
- CIS (1)
- Ann. des Télécommunications
- ARES
- J. Networks
Related Topics
Related Keywords
Popularity