| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2014 | J | jnl |
Telecommun. Syst.
|
| 2013 | A | conf |
AsiaCCS
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | A | conf |
AsiaCCS
|
| 2013 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2013 | J | jnl |
IEEE Trans. Veh. Technol.
|
| 2013 | A | conf |
AsiaCCS
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
WWW (Companion Volume)
|
| 2012 | — | conf |
ICC
|
| 2012 | A* | conf |
INFOCOM
|
| 2012 | — | conf |
MILCOM
|
| 2012 | A | conf |
AsiaCCS
|
| 2012 | Misc | conf |
ICISC
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | A* | conf |
CCS
|
| 2011 | J | jnl |
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen.
KSII Trans. Internet Inf. Syst.
|
| 2011 | J | jnl |
CoRR
|
| 2011 | A* | conf |
INFOCOM
|
| 2011 | A* | conf |
NDSS
|
| 2011 | — | conf |
ICUIMC
|
| 2011 | — | conf |
ICC
|
| 2011 | J | jnl |
CoRR
|
| 2011 | — | conf |
ICDCS Workshops
|
| 2010 | J | jnl |
CoRR
|
| 2010 | A* | conf |
CCS
|
| 2010 | A* | conf |
CCS
|
| 2010 | A | conf |
Internet Measurement Conference
|
| 2010 | J | jnl |
J. Commun.
|
| 2010 | J | jnl |
IEICE Trans. Inf. Syst.
|
| 2010 | A* | conf |
CCS
|
| 2009 | — | conf |
ISA
|
| 2009 | J | jnl |
KSII Trans. Internet Inf. Syst.
|
| 2009 | J | jnl |
Int. J. Netw. Secur.
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
KSII Trans. Internet Inf. Syst.
|
| 2009 | J | jnl |
CoRR
|
| 2008 | J | jnl |
CoRR
|
| 2008 | J | jnl |
CoRR
|
| 2008 | C | conf |
UIC
|
| 2008 | J | jnl |
CoRR
|
| 2008 | J | jnl |
CoRR
|
| 2008 | — | conf |
NCM (1)
|
| 2008 | C | conf |
UIC
|
| 2008 | J | jnl |
KSII Trans. Internet Inf. Syst.
|
| 2007 | — | conf |
ICCSA (3)
|
| 2007 | — | conf |
PAKDD Workshops
|
| 2007 | C | conf |
UIC
|
| 2007 | — | conf |
MSN
|
| 2006 | C | conf |
UIC
|
| 2006 | B | conf |
EWSN
|