| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2015 | J | jnl |
ACM Trans. Auton. Adapt. Syst.
|
| 2015 | J | jnl |
J. Netw. Syst. Manag.
|
| 2015 | — | conf |
WMNC
|
| 2014 | — | conf |
PerCom Workshops
|
| 2014 | A | conf |
ICDCS
|
| 2014 | A* | conf |
INFOCOM
|
| 2013 | J | jnl |
J. Comput. Secur.
|
| 2013 | — | conf |
DEBS
|
| 2013 | A* | conf |
INFOCOM
|
| 2013 | — | conf |
Privacy and Identity Management
|
| 2012 | — | conf |
P2P
|
| 2012 | B | conf |
CNSM
|
| 2012 | — | conf |
PerCom Workshops
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | B | conf |
TCC
|
| 2011 | — | — |
|
| 2011 | C | conf |
FIE
|
| 2011 | — | conf |
Peer-to-Peer Computing
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | A | conf |
ESORICS
|
| 2010 | — | conf |
NordSec
|
| 2010 | — | conf |
Peer-to-Peer Computing
|
| 2008 | — | conf |
AFRICACRYPT
|
| 2006 | B | conf |
ACNS
|