Top publications
h5-index is the h-index for articles published in the last 5 complete years. It is the largest number h such that h articles published in 2014-2018 have at least h citations each.hide
h5-median for a publication is the median number of citations for the articles that make up its h5-index.hide
Publicationh5-indexh5-median
1.ACM Symposium on Computer and Communications Security82123
2.USENIX Security Symposium81116
3.IEEE Transactions on Information Forensics and Security78106
4.IEEE Symposium on Security and Privacy72128
5.Network and Distributed System Security Symposium (NDSS)65112
6.International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT)5688
7.International Cryptology Conference (CRYPTO)5387
8.Computers & Security5079
9.IEEE Transactions on Dependable and Secure Computing4761
10.International Conference on Financial Cryptography and Data Security4374
11.International Conference on The Theory and Application of Cryptology and Information Security (ASIACRYPT)4059
12.Theory of Cryptography3756
13.Workshop on Cryptographic Hardware and Embedded Systems (CHES)3658
14.ACM on Asia Conference on Computer and Communications Security3556
15.Security and Communication Networks3549
16.Designs, Codes and Cryptography3543
17.IEEE Security & Privacy3251
18.European Conference on Research in Computer Security3244
19.Computer Security Applications Conference3047
20.International Conference on Practice and Theory in Public Key Cryptography3039
Dates and citation counts are estimated and are determined automatically by a computer program.