The SCEAS System
|
|
|
Conferences in DBLP
[Citations per Year][Position Graph]Information Security and Cryptology (ICISC)- Information Security and Cryptology (ICISC), 1998 (conf/icisc/1998) (18 publications)
- Information Security and Cryptology (ICISC), 1999 (conf/icisc/1999) (21 publications)
- Information Security and Cryptology (ICISC), 2000 (conf/icisc/2000) (20 publications)
- Information Security and Cryptology (ICISC), 2001 (conf/icisc/2001) (33 publications)
- Information Security and Cryptology (ICISC), 2002 (conf/icisc/2002) (36 publications)
- Information Security and Cryptology (ICISC), 2003 (conf/icisc/2003) (33 publications)
- Information Security and Cryptology (ICISC), 2004 (conf/icisc/2004) (35 publications)
- Information Security and Cryptology (ICISC), 2005 (conf/icisc/2005) (34 publications)
- Information Security and Cryptology (ICISC), 2006 (conf/icisc/2006) (28 publications)
- Information Security and Cryptology (ICISC), 2007 (conf/icisc/2007) (28 publications)
- Information Security and Cryptology (ICISC), 2008 (conf/icisc/2008) (26 publications)
- Information Security and Cryptology (ICISC), 2009 (conf/icisc/2009) (25 publications)
|
NOTICE1 |
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades |
NOTICE2 |
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP | |
|
|
|
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002
|