Información Básica
Nombre: Yang Li
Institución: Nanjing University of Aeronautics and Astronautics
Registro: 2015-12-16
Puntuación: 118
CV
Conferencias Seguidas
Mostrando 11-19 de 19 elementos.
CCF | CORE | QUALIS | Abreviación | Nombre Completo | Entrega | Notificación | Conferencia |
---|---|---|---|---|---|---|---|
b | a | a1 | ASIACRYPT | International Conference on the Theory and Application of Cryptology and Information Security | 2025-05-16 | 2025-08-10 | 2025-12-08 |
c | b | SAC | Selected Areas in Cryptography Workshop | 2025-05-07 | 2025-06-20 | 2025-08-11 | |
b | a | a2 | ESORICS | European Symposium on Research in Computer Security | 2025-04-22 | 2025-06-13 | 2025-09-22 |
a | a* | a1 | CCS | ACM Conference on Computer and Communications Security | 2025-04-14 | 2025-07-01 | 2025-10-13 |
a | a* | a1 | FOCS | IEEE Symposium on Foundations of Computer Science | 2025-04-03 | 2025-07-08 | 2025-12-14 |
a | a* | a1 | CRYPTO | International Cryptology Conference | 2025-02-13 | 2025-05-03 | 2025-08-17 |
c | CT-RSA | The Cryptographer's Track at RSA Conference | 2024-10-15 | 2025-01-10 | 2025-04-28 | ||
b | a1 | SAC' | ACM Symposium On Applied Computing | 2024-10-04 | 2024-10-30 | 2025-03-31 | |
b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 |
Mostrando 11-19 de 19 elementos.
Abreviación | Nombre Completo | Entrega | Conferencia |
---|---|---|---|
ASIACRYPT | International Conference on the Theory and Application of Cryptology and Information Security | 2025-05-16 | 2025-12-08 |
SAC | Selected Areas in Cryptography Workshop | 2025-05-07 | 2025-08-11 |
ESORICS | European Symposium on Research in Computer Security | 2025-04-22 | 2025-09-22 |
CCS | ACM Conference on Computer and Communications Security | 2025-04-14 | 2025-10-13 |
FOCS | IEEE Symposium on Foundations of Computer Science | 2025-04-03 | 2025-12-14 |
CRYPTO | International Cryptology Conference | 2025-02-13 | 2025-08-17 |
CT-RSA | The Cryptographer's Track at RSA Conference | 2024-10-15 | 2025-04-28 |
SAC' | ACM Symposium On Applied Computing | 2024-10-04 | 2025-03-31 |
ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-11-25 |
Conferencias Asistidas
Revistas Seguidas
Mostrando 1-4 de 4 elementos.
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
b | ACM Transactions on Embedded Computing Systems | 2.800 | ACM | 1539-9087 |
a | Journal of Cryptology | 2.300 | Springer | 0933-2790 |
a | IEEE Transactions on Information Forensics and Security | 6.300 | IEEE | 1556-6013 |
Mostrando 1-4 de 4 elementos.
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
International Journal of Information Security and Privacy | 0.800 | Idea Group Inc |
ACM Transactions on Embedded Computing Systems | 2.800 | ACM |
Journal of Cryptology | 2.300 | Springer |
IEEE Transactions on Information Forensics and Security | 6.300 | IEEE |
Investigadores Seguidos
Nombre | Institución | Registro | Score |
---|---|---|---|
No se encontraron resultados. |
Nombre | Institución | Score |
---|---|---|
No se encontraron resultados. |