| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
EnduraTrust: Achieving Sustained Trust Through a Decentralized Root of Trust for Blockchain Oracles.
IEEE Trans. Netw.
|
| 2026 | Misc | conf |
ICNC
|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2026 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
Data Min. Knowl. Discov.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
EMNLP
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2025 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Inf. Soc.
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | — | conf |
CODASPY
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
SAT-CPS@CODASPY
|
| 2025 | — | conf |
CODASPY
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
TPS-ISA
|
| 2025 | — | conf |
CIC
|
| 2025 | J | jnl |
IEEE Trans. Cybern.
|
| 2025 | J | jnl |
IEEE Trans. Netw. Sci. Eng.
|
| 2025 | A* | conf |
SP
|
| 2025 | B | conf |
ICNP
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2025 | A* | conf |
NDSS
|
| 2025 | B | conf |
TrustCom
|
| 2025 | A* | conf |
DAC
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
IEEE Netw.
|
| 2025 | — | conf |
WISEC
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Found. Trends Priv. Secur.
|
| 2025 | A* | conf |
CCS
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2025 | B | conf |
NetSoft
|
| 2025 | J | jnl |
CoRR
|
| 2024 | B | conf |
CLOUD
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | J | jnl |
ACM Trans. Internet Things
|
| 2024 | C | conf |
INDIN
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
ACM Trans. Knowl. Discov. Data
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | A* | conf |
SP
|
| 2024 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2024 | — | conf |
CIC
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Internet Things J.
|
| 2024 | B | conf |
TrustCom
|
| 2024 | — | conf |
SSE
|
| 2024 | J | jnl |
Comput. Secur.
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2024 | A | conf |
ICDCS
|
| 2024 | A | conf |
AsiaCCS
|
| 2024 | A* | conf |
NDSS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | — | conf |
ICDM (Workshops)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2023 | — | conf |
CIC
|
| 2023 | — | conf |
SmartGridComm
|
| 2023 | J | jnl |
World Wide Web (WWW)
|
| 2023 | A* | conf |
WWW
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
SP
|
| 2023 | — | conf |
ICIT
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
CODASPY
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Internet Things J.
|
| 2023 | B | conf |
ICCCN
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
ACM Comput. Surv.
|
| 2023 | J | jnl |
IEEE Secur. Priv.
|
| 2023 | J | jnl |
ACM Comput. Surv.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
IJCNLP (Findings)
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Comput. Sci. Rev.
|
| 2023 | — | conf |
ESORICS (2)
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Internet Comput.
|
| 2023 | A | conf |
ICDCS
|
| 2022 | J | jnl |
ACM Trans. Internet Techn.
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2022 | J | jnl |
Ethics Inf. Technol.
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2022 | — | conf |
ESORICS (2)
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | A* | conf |
USENIX Security Symposium
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | ed. |
ICAIS (1)
|
| 2022 | — | ed. |
ICAIS (2)
|
| 2022 | — | ed. |
ICAIS (3)
|
| 2022 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2022 | A* | conf |
ICSE
|
| 2022 | J | jnl |
IEEE Intell. Syst.
|
| 2022 | — | conf |
CIC
|
| 2022 | J | jnl |
ACM J. Data Inf. Qual.
|
| 2022 | J | jnl |
ACM J. Data Inf. Qual.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A* | conf |
SP
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2022 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2022 | A | conf |
DSN
|
| 2022 | — | conf |
CIC
|
| 2022 | — | conf |
CODASPY
|
| 2022 | J | jnl |
ACM Trans. Internet Techn.
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
IEEE Internet Things J.
|
| 2022 | — | conf |
CODASPY
|
| 2022 | J | jnl |
J. Comput. Secur.
|
| 2022 | A* | conf |
ICDE
|
| 2022 | B | conf |
IEEE Big Data
|
| 2022 | J | jnl |
IEEE Secur. Priv.
|
| 2022 | A | conf |
AsiaCCS
|
| 2021 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2021 | — | conf |
ICC
|
| 2021 | — | conf |
CODASPY
|
| 2021 | — | conf |
NSysS
|
| 2021 | J | jnl |
Comput. Aided Civ. Infrastructure Eng.
|
| 2021 | — | ed. |
ICAIS (1)
|
| 2021 | — | ed. |
ICAIS (2)
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | C | conf |
SACMAT
|
| 2021 | — | ed. |
ESORICS (1)
|
| 2021 | — | ed. |
ESORICS (2)
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
WISE (1)
|
| 2021 | A | conf |
ACSAC
|
| 2021 | A* | conf |
ICSE
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Discov. Internet Things
|
| 2021 | A* | conf |
SIGIR
|
| 2021 | A | conf |
AsiaCCS
|
| 2021 | A* | conf |
CCS
|
| 2021 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2021 | A | conf |
ICDCS
|
| 2021 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2021 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2021 | J | jnl |
J. Informetrics
|
| 2021 | A* | conf |
IJCAI
|
| 2021 | A | conf |
ICWS
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2020 | J | jnl |
J. Netw. Comput. Appl.
|
| 2020 | J | jnl |
DTRAP
|
| 2020 | A* | conf |
ICDE
|
| 2020 | — | conf |
WISEC
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | ed. |
ICAIS (1)
|
| 2020 | — | ed. |
ICAIS (2)
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A | conf |
ACSAC
|
| 2020 | — | conf |
CODASPY
|
| 2020 | J | jnl |
ACM Trans. Manag. Inf. Syst.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A* | conf |
AAAI
|
| 2020 | — | conf |
EDGE
|
| 2020 | B | conf |
SERVICES
|
| 2020 | A | conf |
ICDCS
|
| 2020 | C | conf |
SACMAT
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
ESORICS (1)
|
| 2020 | A* | conf |
ICDE
|
| 2020 | A | conf |
AsiaCCS
|
| 2020 | — | conf |
TPS-ISA
|
| 2020 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2020 | A* | conf |
ICDE
|
| 2020 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2020 | — | conf |
ICN
|
| 2020 | J | jnl |
CCF Trans. Netw.
|
| 2020 | J | jnl |
IEEE Secur. Priv.
|
| 2019 | B | ed. |
CLOUD
|
| 2019 | C | ed. |
ICCC
|
| 2019 | — | ed. |
SCC
|
| 2019 | A | ed. |
ICWS
|
| 2019 | — | ed. |
BigData Congress
|
| 2019 | — | ed. |
ICIOT
|
| 2019 | — | ed. |
EDGE
|
| 2019 | A* | conf |
CCS
|
| 2019 | C | conf |
ICMLA
|
| 2019 | — | conf |
ITSC
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2019 | — | conf |
IEEE BigData
|
| 2019 | A | conf |
ACSAC
|
| 2019 | — | ed. |
ICAIS (1)
|
| 2019 | — | ed. |
ICAIS (2)
|
| 2019 | — | ed. |
ICAIS (3)
|
| 2019 | — | ed. |
ICAIS (4)
|
| 2019 | J | jnl |
ACM J. Data Inf. Qual.
|
| 2019 | A | conf |
AsiaCCS
|
| 2019 | A | conf |
CIKM
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
ESORICS (1)
|
| 2019 | A | conf |
ICDCS
|
| 2019 | B | conf |
ICCCN
|
| 2019 | A | conf |
ICDCS
|
| 2019 | B | conf |
SMARTCOMP
|
| 2019 | J | jnl |
IEEE Internet Things J.
|
| 2019 | J | jnl |
IEEE Secur. Priv.
|
| 2019 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2019 | — | conf |
WiSec
|
| 2019 | — | conf |
CIC
|
| 2019 | J | jnl |
IEEE Secur. Priv.
|
| 2019 | — | conf |
ESORICS (2)
|
| 2019 | J | jnl |
ACM Comput. Surv.
|
| 2019 | B | conf |
SMARTCOMP
|
| 2019 | — | conf |
IEEE BigData
|
| 2019 | A | conf |
ACSAC
|
| 2019 | — | ch. |
The Internet of Things for Smart Urban Ecosystems
|
| 2019 | B | conf |
SMARTCOMP
|
| 2019 | — | conf |
IEEE BigData
|
| 2019 | — | ed. |
PADG@ESORICS
|
| 2019 | A* | conf |
WWW
|
| 2019 | A* | conf |
NDSS
|
| 2019 | J | jnl |
Proc. IEEE
|
| 2019 | J | jnl |
Comput. Aided Civ. Infrastructure Eng.
|
| 2019 | J | jnl |
Computer
|
| 2019 | A* | conf |
AAAI
|
| 2019 | — | conf |
CODASPY
|
| 2019 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2019 | B | conf |
DCOSS
|
| 2019 | — | conf |
IEEE BigData
|
| 2019 | J | jnl |
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet.
IEEE Trans. Inf. Forensics Secur.
|
| 2019 | A | conf |
ICDCS
|
| 2018 | J | jnl |
Int. J. Cooperative Inf. Syst.
|
| 2018 | — | conf |
CODASPY
|
| 2018 | C | conf |
FUSION
|
| 2018 | J | jnl |
ACM Trans. Internet Techn.
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | — | conf |
PADG@ESORICS
|
| 2018 | J | jnl |
ACM J. Data Inf. Qual.
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2018 | — | ch. |
A Comprehensive Guide Through the Italian Database Research
|
| 2018 | — | conf |
CIC
|
| 2018 | — | conf |
PADG@ESORICS
|
| 2018 | — | ed. |
ICCCS (1)
|
| 2018 | — | ed. |
ICCCS (2)
|
| 2018 | — | ed. |
ICCCS (3)
|
| 2018 | — | ed. |
ICCCS (4)
|
| 2018 | — | ed. |
ICCCS (5)
|
| 2018 | — | ed. |
ICCCS (6)
|
| 2018 | — | conf |
MILCOM
|
| 2018 | — | conf |
CIC
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | A* | conf |
ICDE
|
| 2018 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2018 | — | conf |
PACIS
|
| 2018 | B | conf |
LCN
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Pervasive Mob. Comput.
|
| 2018 | A | conf |
ICDCS
|
| 2018 | A | conf |
ICDCS
|
| 2018 | A* | conf |
NDSS
|
| 2018 | B | conf |
GROUP
|
| 2018 | J | jnl |
ACM Trans. Soc. Comput.
|
| 2018 | C | conf |
SACMAT
|
| 2018 | — | conf |
DSC
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2018 | B | conf |
MDM
|
| 2018 | C | ed. |
SACMAT
|
| 2018 | A | conf |
RAID
|
| 2018 | C | conf |
SACMAT
|
| 2018 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2018 | — | conf |
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories.
CIC
|
| 2018 | C | conf |
SACMAT
|
| 2018 | C | conf |
FUSION
|
| 2018 | — | conf |
PADG@ESORICS
|
| 2018 | C | conf |
SACMAT
|
| 2018 | J | jnl |
Soc. Netw. Anal. Min.
|
| 2018 | — | conf |
PADG@ESORICS
|
| 2018 | J | jnl |
ACM J. Data Inf. Qual.
|
| 2018 | C | conf |
SACMAT
|
| 2017 | A | conf |
ICDCS
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | Misc | conf |
IRI
|
| 2017 | — | conf |
IoTDI
|
| 2017 | C | conf |
SACMAT
|
| 2017 | J | jnl |
IEEE Trans. Software Eng.
|
| 2017 | J | jnl |
ACM Trans. Sens. Networks
|
| 2017 | B | conf |
CNSM
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2017 | — | conf |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI
|
| 2017 | J | jnl |
Computer
|
| 2017 | A* | conf |
CCS
|
| 2017 | — | conf |
ICDCS Workshops
|
| 2017 | J | jnl |
IEEE Access
|
| 2017 | — | ed. |
ICCCS (1)
|
| 2017 | — | ed. |
ICCCS (2)
|
| 2017 | — | conf |
IEEE BigData
|
| 2017 | J | jnl |
IEEE Syst. J.
|
| 2017 | — | conf |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI
|
| 2017 | J | jnl |
WIREs Data Mining Knowl. Discov.
|
| 2017 | — | conf |
CIC
|
| 2017 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2017 | C | conf |
SACMAT
|
| 2017 | B | conf |
ASONAM
|
| 2017 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2017 | J | jnl |
Data Sci. Eng.
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2017 | J | jnl |
IEEE Access
|
| 2017 | — | conf |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI
|
| 2017 | — | conf |
CODASPY
|
| 2017 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2017 | J | jnl |
IEEE Internet Things J.
|
| 2017 | J | jnl |
Mob. Networks Appl.
|
| 2017 | A | conf |
ICDCS
|
| 2017 | — | conf |
MILCOM
|
| 2017 | A* | conf |
CCS
|
| 2017 | A | conf |
AsiaCCS
|
| 2017 | — | conf |
DroNet@MobiSys
|
| 2017 | — | conf |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI
|
| 2017 | A* | conf |
PerCom
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2017 | — | conf |
WISE (2)
|
| 2017 | A | conf |
ICDCS
|
| 2017 | B | conf |
CLOUD
|
| 2017 | C | ed. |
SACMAT
|
| 2017 | — | ed. |
ABAC@CODASPY
|
| 2017 | B | conf |
SERVICES
|
| 2017 | — | conf |
eScience
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | — | conf |
IEEE BigData
|
| 2017 | B | conf |
EWSN
|
| 2017 | — | conf |
CODASPY
|
| 2017 | Misc | conf |
Inscrypt
|
| 2017 | C | conf |
ICISSP
|
| 2017 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2017 | J | jnl |
ACM Trans. Sens. Networks
|
| 2017 | — | conf |
ESORICS (2)
|
| 2017 | A | conf |
ICDCS
|
| 2017 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2017 | — | conf |
BigData Congress
|
| 2017 | — | conf |
SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI
|
| 2016 | C | conf |
SACMAT
|
| 2016 | Misc | conf |
IRI
|
| 2016 | J | jnl |
Data Sci. Eng.
|
| 2016 | — | conf |
DroNet@MobiSys
|
| 2016 | C | conf |
SACMAT
|
| 2016 | Misc | conf |
IRI
|
| 2016 | — | conf |
IEEE BigData
|
| 2016 | C | conf |
PST
|
| 2016 | — | ed. |
ICCCS (1)
|
| 2016 | — | ed. |
ICCCS (2)
|
| 2016 | J | jnl |
Trans. Data Priv.
|
| 2016 | B | conf |
EDBT
|
| 2016 | B | conf |
COMPSAC
|
| 2016 | J | jnl |
WIREs Data Mining Knowl. Discov.
|
| 2016 | — | conf |
IEEE BigData
|
| 2016 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2016 | — | conf |
CODASPY
|
| 2016 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2016 | J | jnl |
J. Inf. Secur. Appl.
|
| 2016 | J | jnl |
Data Sci. Eng.
|
| 2016 | J | jnl |
GeoInformatica
|
| 2016 | J | jnl |
IEEE Trans. Computers
|
| 2016 | A | conf |
AsiaCCS
|
| 2016 | J | jnl |
ACM Trans. Internet Techn.
|
| 2016 | J | jnl |
Data Sci. Eng.
|
| 2016 | A* | conf |
CCS
|
| 2016 | B | conf |
COMPSAC
|
| 2016 | J | jnl |
ACM Trans. Sens. Networks
|
| 2016 | J | jnl |
IEEE Access
|
| 2016 | — | conf |
CODASPY
|
| 2016 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2016 | A* | conf |
ICDE
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | — | ed. |
ABAC@CODASPY
|
| 2016 | A | ed. |
CIKM
|
| 2016 | — | ed. |
MIST@CCS
|
| 2016 | — | ed. |
CODASPY
|
| 2016 | J | jnl |
ACM Trans. Spatial Algorithms Syst.
|
| 2016 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2016 | J | jnl |
Data Sci. Eng.
|
| 2016 | — | conf |
CIC
|
| 2016 | — | conf |
CIC
|
| 2016 | J | jnl |
Computer
|
| 2016 | J | jnl |
Computer
|
| 2016 | — | conf |
eScience
|
| 2016 | A | conf |
ICDCS
|
| 2016 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2016 | A | conf |
ICWS
|
| 2016 | A* | conf |
ICDE
|
| 2016 | J | jnl |
Trans. Data Priv.
|
| 2015 | B | conf |
ICPADS
|
| 2015 | J | jnl |
J. Database Manag.
|
| 2015 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2015 | A | conf |
AsiaCCS
|
| 2015 | A* | conf |
ICDE
|
| 2015 | — | conf |
ISSNIP
|
| 2015 | — | conf |
TrustCom/BigDataSE/ISPA (1)
|
| 2015 | B | conf |
ICPADS
|
| 2015 | — | conf |
BigData Congress
|
| 2015 | J | jnl |
Big Data Res.
|
| 2015 | J | jnl |
IEEE Cloud Comput.
|
| 2015 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2015 | C | conf |
ISI
|
| 2015 | — | conf |
CODASPY
|
| 2015 | J | jnl |
Computer
|
| 2015 | — | conf |
CODASPY
|
| 2015 | J | jnl |
CoRR
|
| 2015 | B | conf |
NSS
|
| 2015 | B | conf |
NSS
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | C | conf |
SACMAT
|
| 2015 | C | conf |
WOWMOM
|
| 2015 | A | conf |
ICDCS
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | A | conf |
ICDCS
|
| 2015 | A* | conf |
CCS
|
| 2015 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2015 | B | conf |
COMPSAC
|
| 2015 | A | conf |
AsiaCCS
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | Misc | conf |
IRI
|
| 2015 | — | conf |
CIC
|
| 2015 | — | ed. |
MIST@CCS
|
| 2015 | A | conf |
ICDCS
|
| 2015 | J | jnl |
Inf. Syst.
|
| 2015 | J | jnl |
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.
IEEE Trans. Dependable Secur. Comput.
|
| 2015 | J | jnl |
Int. J. Inf. Sec.
|
| 2015 | — | conf |
FiCloud
|
| 2015 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2015 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2014 | C | ed. |
CollaborateCom
|
| 2014 | — | conf |
OTM Workshops
|
| 2014 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2014 | J | jnl |
Comput. Secur.
|
| 2014 | J | jnl |
J. Intell. Inf. Syst.
|
| 2014 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2014 | J | jnl |
Trans. Data Priv.
|
| 2014 | J | jnl |
Building access control policy model for privacy preserving and testing policy conflicting problems.
J. Comput. Syst. Sci.
|
| 2014 | — | conf |
DPM/SETOP/QASA
|
| 2014 | A* | conf |
CCS
|
| 2014 | J | jnl |
J. Netw. Comput. Appl.
|
| 2014 | — | conf |
DEXA (2)
|
| 2014 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2014 | — | conf |
CTS
|
| 2014 | B | conf |
SECON
|
| 2014 | — | ed. |
CODASPY
|
| 2014 | J | jnl |
EAI Endorsed Trans. Collab. Comput.
|
| 2014 | J | jnl |
Inf. Syst. Frontiers
|
| 2014 | — | book |
|
| 2014 | — | conf |
ESORICS (2)
|
| 2014 | A* | ed. |
ICDE
|
| 2014 | J | jnl |
Trans. Data Priv.
|
| 2014 | Misc | conf |
SenSys
|
| 2014 | J | jnl |
CoRR
|
| 2014 | A* | conf |
CCS
|
| 2014 | — | conf |
CODASPY
|
| 2014 | A* | conf |
ICDE
|
| 2014 | B | conf |
NSS
|
| 2014 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2014 | A | conf |
AsiaCCS
|
| 2014 | J | jnl |
Int. J. Cooperative Inf. Syst.
|
| 2014 | — | conf |
ESORICS (1)
|
| 2014 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2014 | Misc | ed. |
IRI
|
| 2014 | B | conf |
NOMS
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
Comput. Secur.
|
| 2014 | C | conf |
IPCCC
|
| 2014 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2014 | — | conf |
SIGSPATIAL/GIS
|
| 2014 | — | conf |
CODASPY
|
| 2014 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2014 | B | conf |
COMPSAC
|
| 2014 | C | conf |
CollaborateCom
|
| 2014 | Misc | conf |
HAIS
|
| 2013 | C | ed. |
CollaborateCom
|
| 2013 | B | conf |
NSS
|
| 2013 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2013 | — | conf |
CODASPY
|
| 2013 | Misc | conf |
SenSys
|
| 2013 | — | conf |
CNS
|
| 2013 | — | conf |
CODASPY
|
| 2013 | J | jnl |
J. Supercomput.
|
| 2013 | — | conf |
CODASPY
|
| 2013 | B | conf |
COMPSAC
|
| 2013 | Misc | conf |
IRI
|
| 2013 | J | jnl |
Computer
|
| 2013 | C | conf |
APWeb
|
| 2013 | — | conf |
Secure Data Management
|
| 2013 | A* | conf |
CCS
|
| 2013 | B | conf |
COMPSAC
|
| 2013 | J | jnl |
Trans. Data Priv.
|
| 2013 | B | conf |
EDBT
|
| 2013 | B | conf |
EDBT
|
| 2013 | — | conf |
EDBT/ICDT Workshops
|
| 2013 | — | conf |
SmartGridComm
|
| 2013 | — | conf |
CODASPY
|
| 2013 | Misc | conf |
SenSys
|
| 2013 | B | conf |
COMPSAC
|
| 2013 | B | conf |
NSS
|
| 2013 | B | conf |
NSS
|
| 2013 | J | jnl |
J. Comput. Syst. Sci.
|
| 2013 | B | conf |
GLOBECOM
|
| 2013 | A* | conf |
CCS
|
| 2013 | B | conf |
EDBT
|
| 2013 | C | conf |
CollaborateCom
|
| 2013 | B | conf |
NSS
|
| 2013 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2013 | J | jnl |
Int. J. Inf. Sec.
|
| 2013 | — | book |
|
| 2013 | C | conf |
SACMAT
|
| 2013 | J | jnl |
IEEE Internet Comput.
|
| 2013 | — | book |
|
| 2013 | Misc | conf |
ADC
|
| 2013 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2013 | — | conf |
DARE@CIKM
|
| 2013 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2013 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2013 | — | ed. |
CODASPY
|
| 2013 | B | conf |
NSS
|
| 2012 | — | ed. |
COMPSAC Workshops
|
| 2012 | B | ed. |
COMPSAC
|
| 2012 | — | conf |
ER Workshops
|
| 2012 | — | conf |
IPAW
|
| 2012 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2012 | A* | conf |
ICDE
|
| 2012 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2012 | B | conf |
ICPADS
|
| 2012 | C | conf |
CollaborateCom
|
| 2012 | C | conf |
SACMAT
|
| 2012 | J | jnl |
Inf. Syst. Frontiers
|
| 2012 | J | jnl |
Mob. Networks Appl.
|
| 2012 | B | conf |
CNSM
|
| 2012 | J | jnl |
CoRR
|
| 2012 | — | conf |
SocialCom/PASSAT
|
| 2012 | — | conf |
SmartGridComm
|
| 2012 | J | jnl |
CoRR
|
| 2012 | — | book |
|
| 2012 | J | jnl |
Secur. Commun. Networks
|
| 2012 | A* | conf |
CCS
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | C | conf |
SACMAT
|
| 2012 | C | conf |
SACMAT
|
| 2012 | Misc | ed. |
IRI
|
| 2012 | — | conf |
CODASPY
|
| 2012 | A* | conf |
CCS
|
| 2012 | — | conf |
SocialCom/PASSAT
|
| 2012 | B | ed. |
NSS
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | — | conf |
HealthSec
|
| 2012 | — | conf |
CODASPY
|
| 2012 | Misc | conf |
IRI
|
| 2012 | J | jnl |
Comput. Secur.
|
| 2012 | Misc | conf |
IRI
|
| 2012 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2012 | J | jnl |
IEEE Data Eng. Bull.
|
| 2012 | A* | conf |
ICDE
|
| 2012 | C | conf |
CollaborateCom
|
| 2012 | C | conf |
CollaborateCom
|
| 2012 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2012 | — | ed. |
CODASPY
|
| 2012 | B | conf |
LCN
|
| 2012 | J | jnl |
VLDB J.
|
| 2012 | — | conf |
EDBT/ICDT Workshops
|
| 2012 | J | jnl |
Expert Syst. Appl.
|
| 2011 | J | jnl |
J. Organ. Comput. Electron. Commer.
|
| 2011 | B | conf |
ICCCN
|
| 2011 | A | conf |
ICDCS
|
| 2011 | — | conf |
ICDCS Workshops
|
| 2011 | J | jnl |
Expert Syst. Appl.
|
| 2011 | J | jnl |
ACM Trans. Web
|
| 2011 | J | jnl |
Found. Trends Databases
|
| 2011 | A | conf |
ICWS
|
| 2011 | J | jnl |
GeoInformatica
|
| 2011 | J | jnl |
ACM Journal on Computing and Cultural Heritage
|
| 2011 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2011 | B | conf |
CCGRID
|
| 2011 | J | jnl |
Acta Informatica
|
| 2011 | J | jnl |
IEEE Pervasive Comput.
|
| 2011 | J | jnl |
Comput. Secur.
|
| 2011 | — | ed. |
CODASPY
|
| 2011 | — | conf |
SPRINGL
|
| 2011 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2011 | A | conf |
AsiaCCS
|
| 2011 | A* | conf |
CCS
|
| 2011 | J | jnl |
J. Comput. Syst. Sci.
|
| 2011 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2011 | — | conf |
GIS
|
| 2011 | — | conf |
WPES
|
| 2011 | A* | ed. |
WWW
|
| 2011 | — | ed. |
WWW (Companion Volume)
|
| 2011 | — | ed. |
SPRINGL
|
| 2011 | — | conf |
POLICY
|
| 2011 | Misc | conf |
IRI
|
| 2011 | — | conf |
GIS
|
| 2011 | — | conf |
CSIIRW
|
| 2011 | A | conf |
AsiaCCS
|
| 2011 | C | conf |
CollaborateCom
|
| 2011 | J | jnl |
Comput. Stand. Interfaces
|
| 2011 | C | conf |
SACMAT
|
| 2010 | J | jnl |
World Wide Web
|
| 2010 | — | conf |
DEXA (1)
|
| 2010 | — | conf |
EGES/GISP
|
| 2010 | C | conf |
CollaborateCom
|
| 2010 | A* | conf |
ICDE
|
| 2010 | Misc | conf |
SAC
|
| 2010 | C | conf |
CollaborateCom
|
| 2010 | — | conf |
GIS
|
| 2010 | — | conf |
Secure Data Management
|
| 2010 | — | conf |
IDtrust
|
| 2010 | A | conf |
AsiaCCS
|
| 2010 | A* | conf |
ICDE
|
| 2010 | C | conf |
CSCWD
|
| 2010 | J | jnl |
Int. J. Inf. Sec.
|
| 2010 | — | conf |
IDtrust
|
| 2010 | C | conf |
PST
|
| 2010 | C | conf |
SACMAT
|
| 2010 | A* | conf |
ICDE
|
| 2010 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2010 | J | jnl |
IEEE Internet Comput.
|
| 2010 | B | conf |
EDBT
|
| 2010 | — | conf |
POLICY
|
| 2010 | — | conf |
SIGMOD Conference
|
| 2010 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2010 | J | jnl |
IEEE Trans. Syst. Man Cybern. Part C
|
| 2010 | — | conf |
SPRINGL
|
| 2010 | — | conf |
CSIIRW
|
| 2010 | B | conf |
COMPSAC
|
| 2010 | A | conf |
ICWS
|
| 2010 | — | conf |
Digital Identity Management
|
| 2010 | B | conf |
Mobile Data Management
|
| 2010 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2010 | — | conf |
GIS
|
| 2010 | — | conf |
Digital Identity Management
|
| 2010 | B | conf |
EDBT
|
| 2010 | A | conf |
RAID
|
| 2010 | — | ed. |
SPRINGL
|
| 2010 | — | conf |
DMSN
|
| 2010 | — | conf |
DEXA (2)
|
| 2010 | A | conf |
AsiaCCS
|
| 2010 | — | book |
|
| 2010 | Misc | conf |
ADC
|
| 2010 | J | jnl |
Trans. Data Priv.
|
| 2010 | — | conf |
WAIM
|
| 2010 | — | conf |
CSIIRW
|
| 2010 | Misc | conf |
SEC
|
| 2009 | C | conf |
ISI
|
| 2009 | — | conf |
ICEIS (3)
|
| 2009 | B | conf |
SSTD
|
| 2009 | J | jnl |
Int. J. Inf. Sec.
|
| 2009 | J | jnl |
Knowl. Inf. Syst.
|
| 2009 | J | jnl |
Risk Decis. Anal.
|
| 2009 | C | conf |
SACMAT
|
| 2009 | B | conf |
SSTD
|
| 2009 | C | conf |
CollaborateCom
|
| 2009 | — | conf |
Secure Data Management
|
| 2009 | J | jnl |
Computer
|
| 2009 | J | jnl |
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices.
J. Softw.
|
| 2009 | C | conf |
SACMAT
|
| 2009 | — | conf |
CSIIRW
|
| 2009 | J | jnl |
IBM J. Res. Dev.
|
| 2009 | — | conf |
GIS
|
| 2009 | C | conf |
ISI
|
| 2009 | C | conf |
SIN
|
| 2009 | C | conf |
SACMAT
|
| 2009 | J | jnl |
Trans. Data Priv.
|
| 2009 | — | conf |
SPRINGL
|
| 2009 | C | ed. |
CollaborateCom
|
| 2009 | — | conf |
iNetSeC
|
| 2009 | A | conf |
AsiaCCS
|
| 2009 | — | conf |
SOCA
|
| 2009 | J | jnl |
J. Supercomput.
|
| 2009 | — | conf |
IFIPTM
|
| 2009 | J | jnl |
Trans. Data Priv.
|
| 2009 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2009 | A | conf |
ICWS
|
| 2009 | — | conf |
IEEE CLOUD
|
| 2009 | B | conf |
DASFAA
|
| 2009 | B | conf |
Mobile Data Management
|
| 2009 | — | conf |
UbiMob
|
| 2009 | J | jnl |
Trans. Data Priv.
|
| 2009 | B | conf |
AINA
|
| 2009 | — | conf |
ICOODB
|
| 2009 | — | conf |
STC
|
| 2009 | J | jnl |
IBM J. Res. Dev.
|
| 2009 | — | conf |
GIS
|
| 2009 | — | conf |
ICPP Workshops
|
| 2009 | J | jnl |
IEEE Secur. Priv.
|
| 2009 | J | jnl |
IEEE Data Eng. Bull.
|
| 2009 | J | jnl |
J. Comput. Secur.
|
| 2009 | — | conf |
IDtrust
|
| 2009 | J | jnl |
ACM SIGSPATIAL Special
|
| 2009 | — | ed. |
SPRINGL
|
| 2009 | — | ed. |
COMPSAC (1)
|
| 2009 | — | ed. |
COMPSAC (2)
|
| 2009 | — | ed. |
Digital Identity Management
|
| 2009 | — | conf |
SPRINGL
|
| 2009 | J | jnl |
Proc. VLDB Endow.
|
| 2009 | — | conf |
Secure Data Management
|
| 2009 | — | conf |
SPRINGL
|
| 2009 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2009 | J | jnl |
Int. J. Web Serv. Res.
|
| 2009 | B | conf |
EDBT
|
| 2009 | J | jnl |
Inf. Sci.
|
| 2009 | C | conf |
SACMAT
|
| 2009 | J | jnl |
Proc. VLDB Endow.
|
| 2009 | — | conf |
IFIPTM
|
| 2009 | J | jnl |
Proc. VLDB Endow.
|
| 2009 | B | conf |
DASFAA
|
| 2009 | A | conf |
ICDCS
|
| 2009 | A | conf |
ICWS
|
| 2009 | — | conf |
SPRINGL
|
| 2009 | — | ed. |
IFIPTM
|
| 2009 | A* | conf |
ICDE
|
| 2009 | B | conf |
Mobile Data Management
|
| 2009 | — | conf |
POLICY
|
| 2008 | C | conf |
CollaborateCom
|
| 2008 | A* | conf |
ICDE
|
| 2008 | J | jnl |
IEEE Trans. Syst. Man Cybern. Part C
|
| 2008 | C | conf |
APSCC
|
| 2008 | A* | conf |
INFOCOM
|
| 2008 | A* | conf |
ICDE
|
| 2008 | — | ch. |
Privacy-Preserving Data Mining
|
| 2008 | — | conf |
Secure Data Management
|
| 2008 | J | jnl |
Int. J. Web Serv. Res.
|
| 2008 | — | conf |
Secure Data Management
|
| 2008 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2008 | C | conf |
SACMAT
|
| 2008 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2008 | — | conf |
FTDCS
|
| 2008 | A | conf |
ICSOC
|
| 2008 | — | conf |
POLICY
|
| 2008 | J | jnl |
IEEE Internet Comput.
|
| 2008 | A* | conf |
ICDE
|
| 2008 | J | jnl |
J. Commun.
|
| 2008 | — | conf |
ISECS
|
| 2008 | A | conf |
RAID
|
| 2008 | J | jnl |
VLDB J.
|
| 2008 | — | conf |
POLICY
|
| 2008 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2008 | — | conf |
CSIIRW
|
| 2008 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2008 | B | conf |
ARES
|
| 2008 | — | conf |
BNCOD
|
| 2008 | — | conf |
Digital Identity Management
|
| 2008 | J | jnl |
J. Intell. Inf. Syst.
|
| 2008 | — | conf |
Digital Identity Management
|
| 2008 | C | conf |
SACMAT
|
| 2008 | — | conf |
PervasiveHealth
|
| 2008 | — | conf |
GIS
|
| 2008 | — | ch. |
Wiley Encyclopedia of Computer Science and Engineering
|
| 2008 | C | conf |
ISCC
|
| 2008 | J | jnl |
IEEE Internet Comput.
|
| 2008 | C | conf |
SACMAT
|
| 2008 | — | conf |
SPRINGL
|
| 2008 | — | conf |
ISIPS
|
| 2008 | — | conf |
SEBD
|
| 2008 | A* | conf |
ICDE
|
| 2008 | — | conf |
Peer-to-Peer Computing
|
| 2008 | — | ed. |
Digital Identity Management
|
| 2008 | — | ed. |
SPRINGL
|
| 2008 | C | ed. |
APWeb
|
| 2008 | A* | conf |
ICDE
|
| 2008 | — | conf |
IFIPTM
|
| 2008 | C | conf |
DEXA
|
| 2008 | — | conf |
Secure Data Management
|
| 2008 | J | jnl |
IEEE Trans. Parallel Distributed Syst.
|
| 2008 | A* | conf |
ICDE
|
| 2008 | — | conf |
SPRINGL
|
| 2008 | J | jnl |
J. Comput. Sci. Eng.
|
| 2008 | J | jnl |
J. Netw. Syst. Manag.
|
| 2008 | J | jnl |
Proc. VLDB Endow.
|
| 2008 | — | conf |
ICDE Workshops
|
| 2008 | — | conf |
CEC/EEE
|
| 2008 | — | conf |
SEUS
|
| 2008 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2008 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | A | conf |
ICWS
|
| 2007 | — | conf |
FTDCS
|
| 2007 | C | conf |
ISADS
|
| 2007 | J | jnl |
Int. J. Netw. Manag.
|
| 2007 | C | conf |
SACMAT
|
| 2007 | J | jnl |
Commun. ACM
|
| 2007 | C | conf |
CollaborateCom
|
| 2007 | J | jnl |
Int. J. Inf. Sec.
|
| 2007 | — | conf |
FTDCS
|
| 2007 | — | ch. |
Spatial Data on the Web
|
| 2007 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2007 | C | conf |
SACMAT
|
| 2007 | J | jnl |
Commun. ACM
|
| 2007 | C | conf |
ICICS
|
| 2007 | — | ch. |
Test and Analysis of Web Services
|
| 2007 | A | conf |
ESORICS
|
| 2007 | C | conf |
DEXA
|
| 2007 | J | jnl |
Int. J. Inf. Comput. Secur.
|
| 2007 | — | ch. |
Security, Privacy, and Trust in Modern Data Management
|
| 2007 | Misc | conf |
SAC
|
| 2007 | B | conf |
DASFAA
|
| 2007 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2007 | — | conf |
WPES
|
| 2007 | — | conf |
OTM Conferences (2)
|
| 2007 | J | jnl |
Data Knowl. Eng.
|
| 2007 | A* | conf |
VLDB
|
| 2007 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2007 | — | conf |
Digital Identity Management
|
| 2007 | — | conf |
HCI (9)
|
| 2007 | J | jnl |
J. Comput. Secur.
|
| 2007 | — | conf |
SIGMOD Conference
|
| 2007 | C | conf |
SACMAT
|
| 2007 | C | conf |
IPCCC
|
| 2007 | — | conf |
Digital Identity Management
|
| 2007 | J | jnl |
Computer
|
| 2007 | A | conf |
ICDCS
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | A | conf |
ICWS
|
| 2007 | — | conf |
POLICY
|
| 2006 | C | conf |
CSCWD
|
| 2006 | J | jnl |
Comput. Geosci.
|
| 2006 | J | jnl |
Int. J. Geogr. Inf. Sci.
|
| 2006 | J | jnl |
Int. J. Web Based Communities
|
| 2006 | B | conf |
AVI
|
| 2006 | A | conf |
ICWS
|
| 2006 | B | conf |
MDM
|
| 2006 | A* | conf |
WWW
|
| 2006 | C | conf |
SACMAT
|
| 2006 | — | conf |
MSN
|
| 2006 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2006 | J | jnl |
Int. J. Web Serv. Res.
|
| 2006 | Misc | conf |
SAC
|
| 2006 | C | conf |
Privacy in Statistical Databases
|
| 2006 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2006 | C | conf |
PST
|
| 2006 | J | jnl |
J. Comput. Secur.
|
| 2006 | — | conf |
PACIS
|
| 2006 | C | conf |
SACMAT
|
| 2006 | J | jnl |
Ann. des Télécommunications
|
| 2006 | J | jnl |
Int. J. Comput. Sci. Eng.
|
| 2006 | J | jnl |
SIGMOD Rec.
|
| 2006 | J | jnl |
IEEE Internet Comput.
|
| 2006 | — | conf |
POLICY
|
| 2006 | A | conf |
Privacy Enhancing Technologies
|
| 2006 | — | conf |
Digital Identity Management
|
| 2006 | A* | conf |
ICDE
|
| 2006 | — | conf |
Secure Data Management
|
| 2006 | B | conf |
EDOC
|
| 2006 | J | jnl |
IEEE Trans. Syst. Man Cybern. Part A
|
| 2006 | — | conf |
IEEE SCC
|
| 2006 | C | conf |
SACMAT
|
| 2006 | A* | conf |
ICDE
|
| 2006 | C | conf |
SEKE
|
| 2006 | A | conf |
Privacy Enhancing Technologies
|
| 2006 | — | conf |
IAT Workshops
|
| 2006 | J | jnl |
Int. J. Secur. Networks
|
| 2006 | J | jnl |
World Wide Web
|
| 2006 | J | jnl |
IEEE Trans. Software Eng.
|
| 2006 | C | conf |
SACMAT
|
| 2005 | A | conf |
ICME
|
| 2005 | J | jnl |
Data Min. Knowl. Discov.
|
| 2005 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2005 | — | conf |
DEXA Workshops
|
| 2005 | J | jnl |
Distributed Parallel Databases
|
| 2005 | A | conf |
CIKM
|
| 2005 | — | conf |
Digital Identity Management
|
| 2005 | B | ed. |
SSTD
|
| 2005 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2005 | C | conf |
IEA/AIE
|
| 2005 | A | conf |
CAiSE
|
| 2005 | A | conf |
ICDCS
|
| 2005 | J | jnl |
SIGMOD Rec.
|
| 2005 | J | jnl |
J. Comput. Secur.
|
| 2005 | A | conf |
Privacy Enhancing Technologies
|
| 2005 | A* | conf |
ICDE
|
| 2005 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2005 | B | conf |
MMM
|
| 2005 | — | conf |
IEEE SCC
|
| 2005 | B | conf |
SECON
|
| 2005 | — | conf |
Digital Identity Management
|
| 2005 | C | conf |
SACMAT
|
| 2005 | B | conf |
DaWaK
|
| 2005 | — | conf |
DNIS
|
| 2005 | A | conf |
ACSAC
|
| 2005 | — | ed. |
Journal on Data Semantics II
|
| 2005 | — | conf |
ICPADS (1)
|
| 2005 | — | conf |
POLICY
|
| 2005 | A* | conf |
ICDE
|
| 2005 | — | conf |
FOSAD
|
| 2005 | B | conf |
DASFAA
|
| 2005 | C | conf |
SACMAT
|
| 2005 | — | conf |
Rule Languages for Interoperability
|
| 2005 | C | conf |
SACMAT
|
| 2005 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2005 | A* | conf |
CCS
|
| 2005 | A | conf |
CIKM
|
| 2005 | — | conf |
KES (4)
|
| 2005 | J | jnl |
SIGMOD Rec.
|
| 2005 | J | jnl |
J. Exp. Theor. Artif. Intell.
|
| 2005 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2005 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2004 | — | conf |
IEEE SCC
|
| 2004 | C | conf |
FQAS
|
| 2004 | — | conf |
POLICY
|
| 2004 | — | conf |
PKDD
|
| 2004 | J | jnl |
Multim. Tools Appl.
|
| 2004 | — | conf |
IICIS
|
| 2004 | C | conf |
IDEAS
|
| 2004 | A | conf |
ICWS
|
| 2004 | J | jnl |
Inf. Syst.
|
| 2004 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2004 | C | conf |
FQAS
|
| 2004 | J | jnl |
IEEE Internet Comput.
|
| 2004 | B | ed. |
EDBT
|
| 2004 | — | conf |
RIDE
|
| 2004 | C | conf |
ISC
|
| 2004 | — | conf |
GIS
|
| 2004 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2004 | J | jnl |
SIGMOD Rec.
|
| 2004 | — | conf |
EDBT Workshops
|
| 2004 | J | jnl |
CoRR
|
| 2004 | — | conf |
SEBD
|
| 2004 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2004 | C | conf |
IPCCC
|
| 2004 | — | conf |
GIS
|
| 2004 | J | jnl |
World Wide Web
|
| 2004 | J | jnl |
IEEE Internet Comput.
|
| 2004 | J | jnl |
J. Log. Comput.
|
| 2004 | J | jnl |
Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations.
Int. J. Softw. Eng. Knowl. Eng.
|
| 2004 | — | ch. |
The Practical Handbook of Internet Computing
|
| 2004 | J | jnl |
Int. J. Web Serv. Res.
|
| 2004 | B | conf |
SSDBM
|
| 2004 | A | conf |
Privacy Enhancing Technologies
|
| 2004 | — | conf |
BDA
|
| 2004 | C | conf |
ISC
|
| 2004 | C | conf |
SACMAT
|
| 2004 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2004 | J | jnl |
SIGMOD Rec.
|
| 2004 | — | conf |
DELOS
|
| 2004 | — | conf |
Communications and Multimedia Security
|
| 2004 | — | conf |
FTDCS
|
| 2004 | — | conf |
PaRMa
|
| 2004 | J | jnl |
Comput. Sci. Eng.
|
| 2004 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2004 | C | conf |
SACMAT
|
| 2004 | A* | conf |
ICDE
|
| 2004 | J | jnl |
Computer
|
| 2003 | J | jnl |
SIGMOD Rec.
|
| 2003 | B | conf |
DBSec
|
| 2003 | A | conf |
ICWS
|
| 2003 | J | jnl |
ACM Trans. Inf. Syst.
|
| 2003 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2003 | — | conf |
GIS
|
| 2003 | — | conf |
GIS
|
| 2003 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2003 | A | conf |
ICWS
|
| 2003 | — | conf |
ISICT
|
| 2003 | C | conf |
SACMAT
|
| 2003 | — | conf |
DNIS
|
| 2003 | J | jnl |
Int. J. Inf. Sec.
|
| 2003 | C | conf |
SACMAT
|
| 2003 | — | conf |
SEBD
|
| 2003 | J | jnl |
Data Knowl. Eng.
|
| 2003 | J | jnl |
Theory Pract. Log. Program.
|
| 2003 | — | conf |
APPIA-GULP-PRODE
|
| 2003 | — | conf |
SEBD
|
| 2003 | J | jnl |
J. Intell. Inf. Syst.
|
| 2003 | — | conf |
SEBD
|
| 2003 | — | conf |
OTM
|
| 2003 | C | conf |
ISMIS
|
| 2003 | J | jnl |
IEEE Multim.
|
| 2003 | J | jnl |
Comput. Secur.
|
| 2003 | J | jnl |
Inf. Syst.
|
| 2003 | — | ch. |
Intelligent Exploration of the Web
|
| 2003 | A | conf |
ESORICS
|
| 2003 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2003 | B | conf |
DBSec
|
| 2003 | J | jnl |
Inf. Syst.
|
| 2003 | A | conf |
ER
|
| 2003 | — | conf |
Communications and Multimedia Security
|
| 2003 | J | jnl |
Obj. Logiciel Base données Réseaux
|
| 2003 | — | conf |
APPIA-GULP-PRODE
|
| 2003 | A* | conf |
SIGGRAPH
|
| 2003 | — | conf |
POLICY
|
| 2002 | B | ed. |
WISE
|
| 2002 | C | ed. |
SACMAT
|
| 2002 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2002 | J | jnl |
J. Intell. Inf. Syst.
|
| 2002 | — | conf |
POLICY
|
| 2002 | A* | conf |
CCS
|
| 2002 | B | ed. |
EDBT
|
| 2002 | — | conf |
ECDL
|
| 2002 | J | jnl |
VLDB J.
|
| 2002 | B | conf |
DBSec
|
| 2002 | C | conf |
TIME
|
| 2002 | — | conf |
EDBT Workshops
|
| 2002 | J | jnl |
IEEE Internet Comput.
|
| 2002 | B | conf |
COMPSAC
|
| 2002 | J | jnl |
IEEE Distributed Syst. Online
|
| 2002 | J | jnl |
CoRR
|
| 2002 | B | conf |
COMPSAC
|
| 2002 | C | conf |
SACMAT
|
| 2002 | C | conf |
ISMIS
|
| 2002 | J | jnl |
Data Knowl. Eng.
|
| 2002 | C | conf |
IDEAS
|
| 2002 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2002 | C | conf |
SACMAT
|
| 2002 | B | conf |
UCS-Router: A Policy Engine for Enforcing Message Routing Rules in a Universal Communication System.
Mobile Data Management
|
| 2002 | J | jnl |
Data Knowl. Eng.
|
| 2002 | J | jnl |
Distributed Parallel Databases
|
| 2001 | C | conf |
TIME
|
| 2001 | C | conf |
ISC
|
| 2001 | C | conf |
SACMAT
|
| 2001 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2001 | — | conf |
RIDE-DM
|
| 2001 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2001 | C | conf |
WETICE
|
| 2001 | J | jnl |
Theory Pract. Log. Program.
|
| 2001 | — | conf |
Information Hiding
|
| 2001 | J | jnl |
IEEE Internet Comput.
|
| 2001 | — | book |
Intelligent Database Systems
|
| 2001 | B | conf |
DASFAA
|
| 2001 | J | jnl |
Fundam. Informaticae
|
| 2001 | C | conf |
TIME
|
| 2001 | C | conf |
SACMAT
|
| 2001 | C | conf |
SACMAT
|
| 2001 | J | jnl |
SIGMOD Rec.
|
| 2001 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2001 | J | jnl |
IEEE Internet Comput.
|
| 2001 | — | conf |
SIGMOD Conference
|
| 2001 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2001 | J | jnl |
IEEE Internet Comput.
|
| 2001 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2000 | J | jnl |
J. Comput. Secur.
|
| 2000 | J | jnl |
J. Log. Program.
|
| 2000 | J | jnl |
J. Comput. Secur.
|
| 2000 | B | conf |
LREC
|
| 2000 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2000 | A | conf |
CIKM
|
| 2000 | J | jnl |
Softw. Pract. Exp.
|
| 2000 | B | conf |
DBSec
|
| 2000 | A | ed. |
ECOOP
|
| 2000 | — | conf |
Advances in Exception Handling Techniques
|
| 2000 | J | jnl |
Distributed Parallel Databases
|
| 2000 | C | conf |
IDEAS
|
| 2000 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2000 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2000 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2000 | B | conf |
COMPSAC
|
| 2000 | J | jnl |
Commun. ACM
|
| 2000 | C | conf |
TIME
|
| 2000 | C | conf |
ISMIS
|
| 2000 | J | jnl |
ACM SIGMOD Digit. Rev.
|
| 2000 | J | jnl |
ACM SIGMOD Digit. Rev.
|
| 2000 | J | jnl |
Review - Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels.
ACM SIGMOD Digit. Rev.
|
| 2000 | J | jnl |
ACM SIGMOD Digit. Rev.
|
| 2000 | J | jnl |
World Wide Web
|
| 2000 | — | conf |
ACM Workshop on Role-Based Access Control
|
| 2000 | J | jnl |
J. Comput. Secur.
|
| 2000 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2000 | J | jnl |
Obj. Logiciel Base données Réseaux
|
| 1999 | — | conf |
WECWIS
|
| 1999 | J | jnl |
ACM Trans. Inf. Syst.
|
| 1999 | — | conf |
CSFW
|
| 1999 | C | conf |
TIME
|
| 1999 | A | conf |
ECOOP
|
| 1999 | — | conf |
Mobile Networks and Computing
|
| 1999 | — | conf |
PKDD
|
| 1999 | B | conf |
DASFAA
|
| 1999 | — | ed. |
SEBD
|
| 1999 | C | conf |
ISMIS
|
| 1999 | — | conf |
ICMCS, Vol. 2
|
| 1999 | — | conf |
Workshop on Web Information and Data Management
|
| 1999 | J | jnl |
Inf. Process. Lett.
|
| 1999 | A* | conf |
ICDE
|
| 1999 | — | conf |
FMLDO
|
| 1999 | — | conf |
FMLDO - Selected Papers
|
| 1999 | J | jnl |
Data Knowl. Eng.
|
| 1999 | J | jnl |
Theory Pract. Object Syst.
|
| 1999 | B | conf |
COMPSAC
|
| 1999 | J | jnl |
ACM SIGMOD Digit. Rev.
|
| 1999 | J | jnl |
J. Comput. Secur.
|
| 1999 | B | conf |
DBSec
|
| 1999 | — | conf |
APPIA-GULP-PRODE
|
| 1999 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1999 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 1998 | J | jnl |
Multim. Syst.
|
| 1998 | J | jnl |
J. Intell. Inf. Syst.
|
| 1998 | — | conf |
Transactions and Change in Logic Databases
|
| 1998 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1998 | J | jnl |
ACM Trans. Database Syst.
|
| 1998 | C | conf |
TIME
|
| 1998 | A | conf |
ESORICS
|
| 1998 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1998 | B | conf |
COMPSAC
|
| 1998 | J | jnl |
Data Knowl. Eng.
|
| 1998 | — | conf |
ICATPN
|
| 1998 | J | jnl |
Inf. Syst.
|
| 1998 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 1998 | A | conf |
OOPSLA
|
| 1998 | A | conf |
ECOOP
|
| 1998 | A | conf |
CP
|
| 1998 | J | jnl |
Theory Pract. Object Syst.
|
| 1998 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1998 | A* | ed. |
ICDE
|
| 1998 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1998 | B | conf |
EDBT
|
| 1997 | J | jnl |
Theory Pract. Object Syst.
|
| 1997 | B | conf |
DBSec
|
| 1997 | — | conf |
SIGMOD Conference
|
| 1997 | — | conf |
ACM Workshop on Role-Based Access Control
|
| 1997 | J | jnl |
Inf. Softw. Technol.
|
| 1997 | B | conf |
DBSec
|
| 1997 | B | conf |
DBSec
|
| 1997 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1997 | J | jnl |
Inf. Syst.
|
| 1997 | — | ch. |
Advanced Transaction Models and Architectures
|
| 1997 | — | book |
|
| 1997 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1997 | — | conf |
CDB
|
| 1997 | — | conf |
SSD
|
| 1997 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1997 | — | conf |
S&P
|
| 1997 | — | ch. |
Multimedia Databases in Perspective
|
| 1997 | J | jnl |
Theory Pract. Object Syst.
|
| 1997 | J | jnl |
Inf. Process. Lett.
|
| 1997 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1997 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1997 | — | conf |
DOOD
|
| 1996 | — | ch. |
Multimedia Database System: Issues and Research Direction
|
| 1996 | B | conf |
SOFSEM
|
| 1996 | B | conf |
EDBT
|
| 1996 | A* | conf |
ICDE
|
| 1996 | A* | conf |
CCS
|
| 1996 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1996 | Misc | conf |
SEC
|
| 1996 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1996 | A* | conf |
CCS
|
| 1996 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1996 | A | ed. |
ESORICS
|
| 1996 | — | conf |
VIEWS
|
| 1996 | J | jnl |
Inf. Process. Lett.
|
| 1996 | A* | conf |
PODS
|
| 1996 | — | conf |
S&P
|
| 1996 | A* | conf |
VLDB
|
| 1996 | — | conf |
ISAW/Viewpoints@FSE
|
| 1995 | J | jnl |
J. Comput. Secur.
|
| 1995 | — | conf |
NGITS
|
| 1995 | J | jnl |
Inf. Syst.
|
| 1995 | A | conf |
CIKM
|
| 1995 | — | conf |
CDB
|
| 1995 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1995 | A | conf |
ECOOP
|
| 1995 | B | conf |
DBSec
|
| 1995 | B | conf |
DBSec
|
| 1995 | — | conf |
RIDE-DOM
|
| 1995 | C | conf |
NSPW
|
| 1995 | — | conf |
SIGMOD Conference
|
| 1995 | J | jnl |
Theory Pract. Object Syst.
|
| 1994 | — | conf |
GULP-PRODE (2)
|
| 1994 | A* | conf |
CCS
|
| 1994 | C | conf |
NSPW
|
| 1994 | B | conf |
DBSec
|
| 1994 | J | jnl |
Data Knowl. Eng.
|
| 1994 | J | jnl |
Distributed Parallel Databases
|
| 1994 | J | jnl |
Data Knowl. Eng.
|
| 1994 | — | conf |
S&P
|
| 1994 | A | conf |
ECOOP
|
| 1994 | B | conf |
DBSec
|
| 1994 | — | conf |
OOIS
|
| 1994 | J | jnl |
Distributed Parallel Databases
|
| 1994 | J | jnl |
VLDB J.
|
| 1994 | — | conf |
TOOLS (13)
|
| 1994 | A | conf |
ESORICS
|
| 1994 | — | ed. |
ISOOMS
|
| 1994 | A* | conf |
ICDE
|
| 1994 | — | conf |
Workshop on Deductive Databases and Logic Programming
|
| 1994 | — | conf |
RIDE-ADS
|
| 1993 | — | conf |
Advanced Database Systems
|
| 1993 | J | jnl |
J. Comput. Secur.
|
| 1993 | B | conf |
DBSec
|
| 1993 | — | conf |
S&P
|
| 1993 | — | conf |
RIDE-IMS
|
| 1993 | A* | conf |
CCS
|
| 1993 | — | conf |
Security for Object-Oriented Systems
|
| 1993 | — | conf |
GULP
|
| 1993 | A* | conf |
CCS
|
| 1993 | — | conf |
DOOD
|
| 1993 | — | book |
|
| 1993 | J | jnl |
Data Knowl. Eng.
|
| 1993 | A | conf |
CIKM
|
| 1993 | — | conf |
Security for Object-Oriented Systems
|
| 1992 | — | conf |
IFIP Congress (3)
|
| 1992 | B | conf |
EDBT
|
| 1992 | — | conf |
POS
|
| 1992 | B | conf |
Advanced Visual Interfaces
|
| 1992 | — | conf |
RIDE-TQP
|
| 1992 | — | conf |
CNKBS
|
| 1992 | — | conf |
ELP
|
| 1992 | A* | conf |
ICDE
|
| 1992 | — | conf |
Workshop on Deductive Databases, JICSLP
|
| 1992 | — | conf |
FMLDO
|
| 1992 | — | conf |
Future Databases
|
| 1992 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1992 | — | conf |
RIDE-TQP
|
| 1992 | J | jnl |
Data Knowl. Eng.
|
| 1992 | — | book |
Sistemi di basi di dati orientate agli oggetti - concetti e architetture.
|
| 1992 | — | conf |
Future Databases
|
| 1992 | B | conf |
EDBT
|
| 1991 | J | jnl |
ACM Trans. Database Syst.
|
| 1991 | — | ch. |
Query Processing for Advanced Database Systems
|
| 1991 | A* | conf |
ICDE
|
| 1991 | — | conf |
RIDE-IMS
|
| 1991 | — | conf |
COOCS
|
| 1991 | J | jnl |
Computer
|
| 1990 | — | conf |
COCS
|
| 1990 | C | conf |
DEXA
|
| 1990 | B | conf |
EDBT
|
| 1989 | — | conf |
SIGMOD Conference
|
| 1989 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1989 | J | jnl |
Inf. Syst.
|
| 1988 | J | jnl |
Acta Informatica
|
| 1988 | — | conf |
COCS
|
| 1988 | B | conf |
EDBT
|
| 1988 | J | jnl |
ACM Trans. Inf. Syst.
|
| 1988 | — | conf |
OODBS
|
| 1988 | J | jnl |
Perform. Evaluation
|
| 1988 | B | conf |
EDBT
|
| 1987 | J | jnl |
Comput. J.
|
| 1986 | J | jnl |
IEEE Database Eng. Bull.
|
| 1984 | A* | conf |
VLDB
|
| 1983 | A | conf |
ER
|
| 1983 | — | conf |
Symposium on Reliability in Distributed Software and Database Systems
|
| 1983 | — | conf |
ICOD
|
| 1983 | A* | conf |
VLDB
|
| 1982 | J | jnl |
IEEE Database Eng. Bull.
|
| 1981 | — | conf |
ECI
|