| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2013 | J | jnl |
ACM Comput. Surv.
|
| 2012 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2011 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2011 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2010 | J | jnl |
ACM Trans. Sens. Networks
|
| 2010 | C | conf |
WOWMOM
|
| 2009 | — | conf |
WISEC
|
| 2009 | — | — |
|
| 2009 | J | jnl |
Ad Hoc Networks
|
| 2009 | J | jnl |
Comput. Commun.
|
| 2008 | — | conf |
WISEC
|
| 2008 | B | conf |
SECON
|
| 2008 | C | conf |
WOWMOM
|