| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | — | conf |
ARES (1)
|
| 2025 | C | conf |
HSI
|
| 2025 | J | jnl |
CoRR
|
| 2025 | B | conf |
TrustCom
|
| 2024 | J | jnl |
CoRR
|
| 2024 | B | conf |
DBSec
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IACR Commun. Cryptol.
|
| 2024 | Misc | conf |
ICISS
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2023 | B | conf |
TrustCom
|
| 2023 | — | conf |
CSCS
|
| 2023 | — | conf |
ITSC
|
| 2023 | — | conf |
VNC
|
| 2023 | J | jnl |
J. Comput. Secur.
|
| 2023 | B | conf |
TrustCom
|
| 2022 | — | conf |
EUSPN/ICTH
|
| 2022 | B | conf |
DBSec
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | — | conf |
FPS
|
| 2020 | — | conf |
ASIACRYPT (2)
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | C | conf |
ICICS
|
| 2018 | C | conf |
CRiSIS
|
| 2017 | Misc | conf |
ICISS
|
| 2017 | C | conf |
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
PST
|
| 2015 | — | conf |
FPS
|
| 2015 | — | — |
|
| 2014 | C | conf |
SACMAT
|
| 2014 | B | conf |
DBSec
|
| 2013 | — | conf |
ICT-EurAsia
|
| 2013 | J | jnl |
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|