| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2022 | J | jnl |
IEEE Trans. Emerg. Top. Comput.
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | A* | conf |
CCS
|
| 2015 | A* | conf |
DAC
|
| 2015 | A* | conf |
DAC
|
| 2014 | J | jnl |
Proc. IEEE
|
| 2014 | A* | conf |
DAC
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | — | book |
Physically Unclonable Functions
|
| 2013 | A* | conf |
CCS
|
| 2013 | A | conf |
CHES
|
| 2013 | — | conf |
CODASPY
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | — |
|
| 2013 | — | ch. |
Ausgezeichnete Informatikdissertationen
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | A | conf |
CHES
|
| 2012 | — | conf |
Financial Cryptography
|
| 2012 | — | conf |
TRUST
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | A* | conf |
CCS
|
| 2011 | A | conf |
CHES
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
J. Cryptogr. Eng.
|
| 2011 | — | conf |
WISEC
|
| 2010 | — | conf |
RFIDSec
|
| 2010 | — | ch. |
Towards Hardware-Intrinsic Security
|
| 2010 | J | jnl |
Trans. Comput. Sci.
|
| 2010 | C | conf |
ISC
|
| 2010 | B | conf |
ACNS
|
| 2010 | — | ch. |
Handbook of Financial Cryptography and Security
|
| 2009 | B | conf |
CANS
|
| 2009 | — | conf |
Privacy in Location-Based Applications
|
| 2008 | — | conf |
PiLBA
|
| 2006 | — | conf |
STC
|