| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2008 | B | conf |
SECON
|
| 2007 | — | conf |
Security Protocols Workshop
|
| 2007 | — | conf |
ESAS
|
| 2007 | — | conf |
Security Protocols Workshop
|
| 2007 | — | conf |
Security Protocols Workshop
|
| 2007 | — | — |
|
| 2007 | — | conf |
Security Protocols Workshop
|
| 2007 | — | conf |
Security Protocols Workshop
|
| 2007 | Misc | conf |
SEC
|
| 2006 | J | jnl |
Int. J. Netw. Secur.
|
| 2006 | J | jnl |
Proc. IEEE
|
| 2006 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2006 | — | conf |
Security Protocols Workshop
|
| 2006 | — | conf |
ESAS
|
| 2006 | J | jnl |
ACM SIGOPS Oper. Syst. Rev.
|
| 2005 | — | conf |
Information Hiding
|
| 2005 | — | conf |
Security Protocols Workshop
|
| 2004 | — | conf |
Cryptographic Algorithms and their Uses
|
| 2004 | — | conf |
ARSPA@IJCAR
|
| 2003 | A | conf |
CHES
|