h5-index is the h-index for articles published in the last 5 complete years. It is the largest number h such that h articles published in 2015-2019 have at least h citations each.hide
h5-median for a publication is the median number of citations for the articles that make up its h5-index.hide
Publication | h5-index | h5-median | |
---|---|---|---|
1. | ACM Symposium on Computer and Communications Security | 88 | 140 |
2. | IEEE Transactions on Information Forensics and Security | 86 | 118 |
3. | USENIX Security Symposium | 80 | 129 |
4. | IEEE Symposium on Security and Privacy | 74 | 142 |
5. | Network and Distributed System Security Symposium (NDSS) | 71 | 111 |
6. | International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT) | 61 | 89 |
7. | Computers & Security | 59 | 90 |
8. | IEEE Transactions on Dependable and Secure Computing | 54 | 77 |
9. | International Cryptology Conference (CRYPTO) | 52 | 87 |
10. | International Conference on Financial Cryptography and Data Security | 46 | 74 |
11. | International Conference on The Theory and Application of Cryptology and Information Security (ASIACRYPT) | 42 | 61 |
12. | Security and Communication Networks | 40 | 51 |
13. | Theory of Cryptography | 38 | 58 |
14. | ACM on Asia Conference on Computer and Communications Security | 37 | 55 |
15. | Proceedings on Privacy Enhancing Technologies | 35 | 55 |
16. | IEEE European Symposium on Security and Privacy | 34 | 74 |
17. | Designs, Codes and Cryptography | 34 | 50 |
18. | European Conference on Research in Computer Security | 34 | 43 |
19. | IEEE Security & Privacy | 31 | 53 |
20. | Journal of Information Security and Applications | 31 | 40 |
Dates and citation counts are estimated and are determined automatically by a computer program.