| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Secur. Priv.
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
Expert Syst. Appl.
|
| 2026 | J | jnl |
CoRR
|
| 2025 | J | jnl |
MIS Q.
|
| 2025 | J | jnl |
Commun. ACM
|
| 2025 | J | jnl |
IEEE Secur. Priv.
|
| 2025 | J | jnl |
IEEE Secur. Priv.
|
| 2025 | J | jnl |
Commun. ACM
|
| 2024 | J | jnl |
J. Cybersecur.
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Commun. ACM
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
RFC
|
| 2023 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
CSCML
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2020 | J | jnl |
Computer
|
| 2020 | J | jnl |
IEEE Secur. Priv.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
J. Cybersecur.
|
| 2020 | J | jnl |
IEEE Secur. Priv.
|
| 2019 | J | jnl |
IEEE Secur. Priv.
|
| 2018 | J | jnl |
IEEE Secur. Priv.
|
| 2018 | J | jnl |
IEEE Secur. Priv.
|
| 2018 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2016 | J | jnl |
IEEE Secur. Priv.
|
| 2016 | J | jnl |
IEEE Secur. Priv.
|
| 2015 | J | jnl |
RFC
|
| 2015 | J | jnl |
Commun. ACM
|
| 2015 | J | jnl |
J. Cybersecur.
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
IEEE Secur. Priv.
|
| 2015 | J | jnl |
IEEE Technol. Soc. Mag.
|
| 2014 | J | jnl |
IEEE Secur. Priv.
|
| 2014 | J | jnl |
IEEE Secur. Priv.
|
| 2013 | — | ed. |
WEIS (Springer Volume)
|
| 2013 | J | jnl |
IEEE Secur. Priv.
|
| 2013 | J | jnl |
IEEE Secur. Priv.
|
| 2012 | J | jnl |
IEEE Secur. Priv.
|
| 2012 | J | jnl |
IEEE Secur. Priv.
|
| 2011 | J | jnl |
IEEE Secur. Priv.
|
| 2011 | J | jnl |
IEEE Secur. Priv.
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2010 | — | book |
|
| 2010 | J | jnl |
J. Priv. Confidentiality
|
| 2010 | J | jnl |
IEEE Secur. Priv.
|
| 2010 | J | jnl |
Secur. Commun. Networks
|
| 2009 | J | jnl |
IEEE Secur. Priv.
|
| 2009 | J | jnl |
IEEE Secur. Priv.
|
| 2008 | — | conf |
HotSec
|
| 2008 | J | jnl |
IEEE Secur. Priv.
|
| 2008 | — | book |
Schneier on security.
|
| 2008 | — | conf |
AFRICACRYPT
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | J | jnl |
Commun. ACM
|
| 2006 | — | book |
|
| 2006 | — | book |
|
| 2006 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | J | jnl |
ACM Queue
|
| 2005 | J | jnl |
RFC
|
| 2005 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | J | jnl |
Commun. ACM
|
| 2005 | A* | conf |
EUROCRYPT
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | J | jnl |
Commun. ACM
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | — | ch. |
Economics of Information Security
|
| 2004 | J | jnl |
Computer
|
| 2004 | J | jnl |
Commun. ACM
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | — | book |
Secrets and lies - IT-Sicherheit in einer vernetzten Welt.
|
| 2004 | — | book |
Secrets and lies - digital security in a networked world: with new information about post-9/11 security.
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | J | jnl |
ACM Queue
|
| 2004 | J | jnl |
Commun. ACM
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2003 | J | jnl |
IEEE Secur. Priv.
|
| 2003 | J | jnl |
IEEE Secur. Priv.
|
| 2003 | A* | conf |
FSE
|
| 2003 | J | jnl |
IEEE Secur. Priv.
|
| 2003 | — | book |
Practical cryptography.
|
| 2003 | J | jnl |
IEEE Secur. Priv.
|
| 2003 | J | jnl |
Commun. ACM
|
| 2003 | J | jnl |
IEEE Secur. Priv.
|
| 2002 | C | conf |
ISC
|
| 2001 | J | jnl |
Commun. ACM
|
| 2001 | A* | ed. |
FSE
|
| 2001 | J | jnl |
Commun. ACM
|
| 2001 | J | jnl |
Comput. Secur.
|
| 2001 | J | jnl |
Commun. ACM
|
| 2000 | A* | conf |
USENIX Security Symposium
|
| 2000 | — | conf |
AES Candidate Conference
|
| 2000 | J | jnl |
Cryptologia
|
| 2000 | A* | conf |
FSE
|
| 2000 | — | conf |
AES Candidate Conference
|
| 2000 | A* | conf |
FSE
|
| 2000 | — | conf |
AES Candidate Conference
|
| 2000 | — | conf |
AES Candidate Conference
|
| 2000 | J | jnl |
Future Gener. Comput. Syst.
|
| 2000 | J | jnl |
Commun. ACM
|
| 2000 | J | jnl |
Commun. ACM
|
| 2000 | Misc | conf |
ACISP
|
| 2000 | J | jnl |
Commun. ACM
|
| 2000 | J | jnl |
J. Comput. Secur.
|
| 2000 | C | ed. |
CARDIS
|
| 1999 | — | conf |
Smartcard
|
| 1999 | — | conf |
CQRE
|
| 1999 | J | jnl |
Computer
|
| 1999 | B | conf |
Selected Areas in Cryptography
|
| 1999 | — | conf |
Recent Advances in Intrusion Detection
|
| 1999 | A* | conf |
FSE
|
| 1999 | C | conf |
ICICS
|
| 1999 | J | jnl |
Commun. ACM
|
| 1999 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 1999 | J | jnl |
First Monday
|
| 1999 | J | jnl |
Commun. ACM
|
| 1999 | J | jnl |
Commun. ACM
|
| 1999 | B | conf |
Selected Areas in Cryptography
|
| 1998 | A | conf |
ACSAC
|
| 1998 | A* | conf |
CRYPTO
|
| 1998 | A* | conf |
CCS
|
| 1998 | B | conf |
Selected Areas in Cryptography
|
| 1998 | — | conf |
Financial Cryptography
|
| 1998 | B | conf |
Selected Areas in Cryptography
|
| 1998 | A* | conf |
FSE
|
| 1998 | A* | conf |
FSE
|
| 1998 | J | jnl |
Computer
|
| 1998 | A* | conf |
USENIX Security Symposium
|
| 1998 | — | conf |
USENIX Workshop on Electronic Commerce
|
| 1998 | — | conf |
Mobile Agents and Security
|
| 1998 | B | conf |
Selected Areas in Cryptography
|
| 1998 | C | conf |
CARDIS
|
| 1998 | J | jnl |
Inf. Manag. Comput. Secur.
|
| 1998 | A | conf |
ESORICS
|
| 1998 | C | conf |
Workshop on New Security Paradigms
|
| 1998 | C | conf |
CARDIS
|
| 1997 | A | conf |
ACSAC
|
| 1997 | A* | conf |
CCS
|
| 1997 | A* | conf |
CRYPTO
|
| 1997 | J | jnl |
Commun. ACM
|
| 1997 | A* | conf |
FSE
|
| 1997 | — | conf |
Security Protocols Workshop
|
| 1997 | C | conf |
ICICS
|
| 1997 | A | conf |
ACSAC
|
| 1997 | J | jnl |
Future Gener. Comput. Syst.
|
| 1997 | — | conf |
ISW
|
| 1997 | J | jnl |
World Wide Web J.
|
| 1996 | A | conf |
ACSAC
|
| 1996 | — | book |
Angewandte Kryptographie - Protokolle, Algorithmen und Sourcecode in C.
|
| 1996 | — | book |
|
| 1996 | C | conf |
CARDIS
|
| 1996 | — | conf |
Security Protocols Workshop
|
| 1996 | A | conf |
ESORICS
|
| 1996 | A* | conf |
CRYPTO
|
| 1996 | J | jnl |
World Wide Web J.
|
| 1996 | A* | conf |
FSE
|
| 1995 | — | conf |
WWW (Fall)
|
| 1994 | C | conf |
NSPW
|
| 1994 | A* | conf |
FSE
|
| 1993 | A* | conf |
FSE
|