| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | A* | conf |
HPCA
|
| 2026 | A* | conf |
CHI
|
| 2025 | — | conf |
AIED (2)
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
SIGCSE (2)
|
| 2025 | J | jnl |
CoRR
|
| 2024 | — | conf |
SIGCSE (1)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
M2VIP
|
| 2024 | — | conf |
SIGCSE (2)
|
| 2024 | A* | conf |
ICML
|
| 2024 | J | jnl |
IEEE Internet Comput.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | A* | conf |
SP
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2023 | — | conf |
SIGCSE (1)
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Found. Trends Priv. Secur.
|
| 2023 | J | jnl |
CoRR
|
| 2022 | — | conf |
SIGCSE (2)
|
| 2022 | B | conf |
L@S
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | B | conf |
L@S
|
| 2021 | B | conf |
L@S
|
| 2021 | — | conf |
ICETM
|
| 2020 | — | conf |
Blockchain
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A* | conf |
CHI
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
LWMOOCS
|
| 2019 | J | jnl |
J. Cryptol.
|
| 2018 | — | conf |
DPM/CBT@ESORICS
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | B | conf |
L@S
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
J. Funct. Program.
|
| 2017 | J | jnl |
J. Comput. Secur.
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | — | conf |
CNS
|
| 2016 | A* | conf |
ICLR (Poster)
|
| 2016 | J | jnl |
Proc. Natl. Acad. Sci. USA
|
| 2016 | A* | conf |
NDSS
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2015 | J | jnl |
CoRR
|
| 2015 | A | conf |
UAI
|
| 2015 | J | jnl |
CoRR
|
| 2015 | — | conf |
POST
|
| 2014 | A | conf |
AISTATS
|
| 2014 | — | conf |
CRYPTO (1)
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | A | conf |
STACS
|
| 2014 | A* | conf |
CHI
|
| 2014 | J | jnl |
Ubiquity
|
| 2014 | J | jnl |
Dagstuhl Manifestos
|
| 2014 | J | jnl |
Dagstuhl Reports
|
| 2014 | — | conf |
WOOT
|
| 2013 | — | conf |
NIPS
|
| 2013 | A | conf |
CSF
|
| 2013 | — | ed. |
POST
|
| 2013 | A | conf |
HotOS
|
| 2013 | — | conf |
HealthTech
|
| 2012 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2012 | A | conf |
ICFP
|
| 2012 | — | conf |
IHI
|
| 2012 | J | jnl |
CoRR
|
| 2012 | A* | conf |
OSDI
|
| 2012 | A | conf |
CSF
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
Proc. IEEE
|
| 2012 | A* | conf |
WWW
|
| 2012 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2011 | — | conf |
FSTTCS
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | C | conf |
WoLLIC
|
| 2011 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2011 | — | conf |
NordSec
|
| 2011 | C | conf |
Haskell
|
| 2011 | B | conf |
SAS
|
| 2011 | — | ch. |
Formal Models and Techniques for Analyzing Security Protocols
|
| 2011 | A | conf |
ESORICS
|
| 2011 | J | jnl |
IEEE Secur. Priv.
|
| 2011 | — | conf |
Formal Aspects in Security and Trust
|
| 2011 | A* | conf |
CCS
|
| 2011 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2010 | — | conf |
Financial Cryptography
|
| 2010 | A* | conf |
NDSS
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | — | conf |
CollSec
|
| 2010 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2010 | J | jnl |
J. Comput. Secur.
|
| 2010 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2010 | — | conf |
HealthSec
|
| 2010 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2010 | A | conf |
CSF
|
| 2010 | — | conf |
CSET
|
| 2009 | — | conf |
Model-Based Design of Trustworthy Health Information Systems
|
| 2009 | B | conf |
TrustBus
|
| 2009 | J | jnl |
CoRR
|
| 2009 | A | conf |
ESORICS
|
| 2009 | — | ed. |
Model-Based Design of Trustworthy Health Information Systems
|
| 2009 | — | conf |
WREN
|
| 2009 | J | jnl |
Commun. ACM
|
| 2009 | — | conf |
CCSW
|
| 2009 | Misc | conf |
Inscrypt
|
| 2008 | A | conf |
RAID
|
| 2008 | — | conf |
SecReT@LICS/CSF
|
| 2008 | B | conf |
APLAS
|
| 2008 | B | conf |
ACNS
|
| 2008 | — | ch. |
Botnet Detection
|
| 2008 | J | jnl |
J. Cryptol.
|
| 2008 | A* | conf |
CCS
|
| 2008 | A* | conf |
USENIX Security Symposium
|
| 2008 | — | conf |
WOOT
|
| 2007 | B | conf |
DIMVA
|
| 2007 | — | conf |
TGC
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | A | conf |
ESORICS
|
| 2007 | A | conf |
CSF
|
| 2007 | — | conf |
Computation, Meaning, and Logic
|
| 2007 | — | conf |
HotSec
|
| 2006 | J | jnl |
Theor. Comput. Sci.
|
| 2006 | J | jnl |
Theor. Comput. Sci.
|
| 2006 | — | conf |
CSFW
|
| 2006 | B | conf |
TCC
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | A* | conf |
LICS
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | — | conf |
S&P
|
| 2006 | A* | conf |
WWW
|
| 2006 | — | conf |
ASIAN
|
| 2006 | J | jnl |
Int. J. Inf. Sec.
|
| 2005 | J | jnl |
J. Comput. Secur.
|
| 2005 | A* | conf |
CCS
|
| 2005 | J | jnl |
J. ACM
|
| 2005 | — | conf |
CSFW
|
| 2005 | J | jnl |
J. Log. Algebraic Methods Program.
|
| 2005 | — | conf |
WITS
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | B | conf |
TCC
|
| 2005 | A* | conf |
ICALP
|
| 2005 | — | ed. |
FMSE
|
| 2005 | A* | conf |
NDSS
|
| 2005 | C | conf |
PPDP
|
| 2005 | A* | conf |
USENIX Security Symposium
|
| 2004 | C | conf |
ISC
|
| 2004 | — | conf |
CSFW
|
| 2004 | — | conf |
Workshop on Wireless Security
|
| 2004 | A* | conf |
NDSS
|
| 2004 | — | conf |
WPES
|
| 2004 | — | ed. |
IFIP TCS
|
| 2004 | J | jnl |
J. Comput. Secur.
|
| 2004 | B | conf |
FoSSaCS
|
| 2004 | J | jnl |
J. Comput. Secur.
|
| 2004 | A | conf |
ACSAC
|
| 2003 | J | jnl |
J. Comput. Secur.
|
| 2003 | — | conf |
CSFW
|
| 2003 | — | conf |
DISCEX (1)
|
| 2003 | J | jnl |
J. Autom. Reason.
|
| 2003 | — | conf |
S&P
|
| 2003 | B | conf |
CONCUR
|
| 2003 | — | book |
Concepts in programming languages.
|
| 2003 | B | conf |
CONCUR
|
| 2003 | C | conf |
PADL
|
| 2003 | J | jnl |
J. Comput. Secur.
|
| 2003 | — | conf |
FMSE
|
| 2003 | B | conf |
MFPS
|
| 2003 | — | conf |
FMSE
|
| 2003 | J | jnl |
Int. J. Softw. Tools Technol. Transf.
|
| 2003 | — | conf |
S&P
|
| 2003 | — | conf |
CSFW
|
| 2002 | — | conf |
ISSS
|
| 2002 | — | conf |
ISSS
|
| 2002 | A* | ed. |
POPL
|
| 2002 | — | conf |
S&P
|
| 2002 | J | jnl |
Theor. Comput. Sci.
|
| 2002 | — | conf |
RTA
|
| 2001 | — | conf |
CSFW
|
| 2001 | B | conf |
MFPS
|
| 2001 | — | conf |
CSFW
|
| 2001 | A* | conf |
CCS
|
| 2001 | A | conf |
ESOP
|
| 2001 | A* | conf |
LICS
|
| 2001 | A* | conf |
POPL
|
| 2000 | — | conf |
Financial Cryptography
|
| 2000 | A* | conf |
NDSS
|
| 2000 | A* | conf |
ASPLOS
|
| 2000 | — | conf |
CSFW
|
| 1999 | B | conf |
MFPS
|
| 1999 | A | conf |
OOPSLA
|
| 1999 | — | conf |
CSFW
|
| 1999 | J | jnl |
Theor. Comput. Sci.
|
| 1999 | J | jnl |
Inf. Process. Lett.
|
| 1999 | — | conf |
World Congress on Formal Methods
|
| 1999 | J | jnl |
ACM Trans. Program. Lang. Syst.
|
| 1998 | A* | conf |
FOCS
|
| 1998 | A* | conf |
CCS
|
| 1998 | A | conf |
OOPSLA
|
| 1998 | A* | conf |
USENIX Security Symposium
|
| 1998 | A* | conf |
CAV
|
| 1998 | J | jnl |
Theory Pract. Object Syst.
|
| 1997 | — | conf |
HOOTS
|
| 1997 | A | conf |
OOPSLA
|
| 1997 | — | conf |
S&P
|
| 1997 | J | jnl |
ACM SIGPLAN Notices
|
| 1997 | J | jnl |
SIGACT News
|
| 1996 | A* | conf |
ICALP
|
| 1996 | — | book |
Foundations for programming languages.
|
| 1996 | J | jnl |
Bull. Symb. Log.
|
| 1996 | J | jnl |
ACM Comput. Surv.
|
| 1996 | J | jnl |
Inf. Comput.
|
| 1996 | J | jnl |
ACM Comput. Surv.
|
| 1996 | — | conf |
Linear Logic Tokyo Meeting
|
| 1995 | B | conf |
FCT
|
| 1995 | A* | conf |
POPL
|
| 1995 | J | jnl |
Theory Pract. Object Syst.
|
| 1994 | A* | conf |
POPL
|
| 1994 | J | jnl |
Nord. J. Comput.
|
| 1994 | J | jnl |
Inf. Comput.
|
| 1994 | — | conf |
TACS
|
| 1994 | — | conf |
Workshop on Interface Definition Languages
|
| 1994 | — | ed. |
TACS
|
| 1993 | A* | conf |
LICS
|
| 1993 | J | jnl |
Sci. Comput. Program.
|
| 1993 | J | jnl |
ACM Trans. Program. Lang. Syst.
|
| 1993 | A* | conf |
LICS
|
| 1993 | J | jnl |
Fundam. Informaticae
|
| 1992 | A* | conf |
POPL
|
| 1992 | J | jnl |
Ann. Pure Appl. Log.
|
| 1992 | B | conf |
CSL
|
| 1992 | A* | conf |
LICS
|
| 1992 | A* | conf |
POPL
|
| 1991 | A* | conf |
POPL
|
| 1991 | — | conf |
TACS
|
| 1991 | — | conf |
Constructivity in Computer Science
|
| 1991 | J | jnl |
Ann. Pure Appl. Log.
|
| 1991 | — | conf |
TACS
|
| 1991 | — | conf |
Artificial and Mathematical Theory of Computation
|
| 1991 | J | jnl |
Math. Struct. Comput. Sci.
|
| 1991 | J | jnl |
J. Funct. Program.
|
| 1991 | — | conf |
Computational Logic - Essays in Honor of Alan Robinson
|
| 1990 | A* | conf |
FOCS
|
| 1990 | A* | conf |
POPL
|
| 1990 | — | conf |
LISP and Functional Programming
|
| 1990 | J | jnl |
Inf. Comput.
|
| 1990 | A* | conf |
POPL
|
| 1990 | — | ch. |
Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B)
|
| 1989 | — | conf |
FPCA
|
| 1989 | — | conf |
Category Theory and Computer Science
|
| 1989 | B | conf |
Mathematical Foundations of Programming Semantics
|
| 1989 | A* | conf |
POPL
|
| 1988 | J | jnl |
ACM Trans. Program. Lang. Syst.
|
| 1988 | — | conf |
LISP and Functional Programming
|
| 1988 | J | jnl |
Inf. Comput.
|
| 1988 | A* | conf |
POPL
|
| 1987 | A* | conf |
POPL
|
| 1987 | A* | conf |
LICS
|
| 1986 | — | conf |
LISP and Functional Programming
|
| 1986 | B | conf |
TARK
|
| 1986 | A* | conf |
POPL
|
| 1985 | A* | conf |
POPL
|
| 1985 | — | conf |
Logic of Programs
|
| 1984 | A* | conf |
POPL
|
| 1984 | — | — |
|
| 1984 | J | jnl |
J. Log. Program.
|
| 1984 | A* | conf |
FOCS
|
| 1983 | A* | conf |
PODS
|
| 1983 | J | jnl |
Inf. Control.
|
| 1983 | J | jnl |
Inf. Control.
|
| 1982 | A* | conf |
POPL
|