| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2021 | J | jnl |
CoRR
|
| 2018 | A* | conf |
USENIX Security Symposium
|
| 2015 | B | conf |
IC2E
|
| 2015 | J | jnl |
IEEE Cloud Comput.
|
| 2014 | A | conf |
Middleware
|
| 2008 | — | book |
A Practical Guide to Trusted Computing.
|
| 2008 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2001 | J | jnl |
IBM Syst. J.
|
| 2000 | — | conf |
AES Candidate Conference
|
| 1997 | J | jnl |
Comput. Secur.
|
| 1996 | A* | conf |
USENIX Security Symposium
|
| 1993 | A* | conf |
USENIX Security Symposium
|
| 1993 | A* | conf |
USENIX Security Symposium
|