| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2015 | J | jnl |
IEEE Technol. Soc. Mag.
|
| 2012 | — | conf |
Financial Cryptography Workshops
|
| 2012 | — | conf |
Financial Cryptography Workshops
|
| 2012 | — | conf |
LEET
|
| 2012 | J | jnl |
IEEE Secur. Priv.
|
| 2011 | J | jnl |
IEEE Secur. Priv.
|
| 2011 | — | conf |
Financial Cryptography Workshops
|
| 2010 | — | conf |
Financial Cryptography Workshops
|
| 2009 | J | jnl |
login Usenix Mag.
|
| 2009 | J | jnl |
login Usenix Mag.
|
| 2008 | — | conf |
MALWARE
|
| 2007 | J | jnl |
login Usenix Mag.
|
| 2007 | J | jnl |
login Usenix Mag.
|
| 2000 | — | conf |
LISA
|