| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2026 | J | jnl |
IEEE Trans. Vis. Comput. Graph.
|
| 2025 | B | conf |
TrustCom
|
| 2025 | J | jnl |
CoRR
|
| 2025 | C | conf |
ProvSec
|
| 2025 | J | jnl |
CoRR
|
| 2025 | C | conf |
ProvSec
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
Int. J. Prod. Res.
|
| 2025 | C | conf |
ProvSec
|
| 2025 | A* | conf |
CCS
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | B | conf |
TrustCom
|
| 2025 | — | ed. |
ProvSec (1)
|
| 2025 | — | ed. |
ProvSec (2)
|
| 2025 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2025 | C | conf |
ProvSec
|
| 2025 | — | conf |
LAMPS@CCS
|
| 2025 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2025 | — | conf |
ACISP (1)
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | — | conf |
ACISP (3)
|
| 2024 | J | jnl |
IEEE Trans. Engineering Management
|
| 2024 | — | conf |
ACISP (3)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | — | conf |
ACISP (2)
|
| 2024 | J | jnl |
Distributed Ledger Technol. Res. Pract.
|
| 2024 | J | jnl |
Inf. Sci.
|
| 2024 | C | conf |
PRDC
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | — | conf |
CRYPTO (1)
|
| 2024 | — | conf |
Blockchain
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | A* | conf |
CCS
|
| 2024 | — | conf |
ACISP (3)
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
ACM Comput. Surv.
|
| 2023 | A* | conf |
WWW
|
| 2023 | A* | conf |
SP
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
Distributed Ledger Technol. Res. Pract.
|
| 2023 | B | conf |
TrustCom
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | A | ed. |
ASIACCS
|
| 2023 | B | conf |
TrustCom
|
| 2023 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2023 | J | jnl |
Comput. J.
|
| 2023 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
Neurocomputing
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2022 | A | conf |
AsiaCCS
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | B | conf |
NSS
|
| 2022 | — | conf |
Blockchain
|
| 2022 | B | conf |
NSS
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | A | conf |
ICDCS
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | C | conf |
ISC
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | — | conf |
ESORICS (1)
|
| 2022 | B | conf |
ACNS
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | J | jnl |
J. Comput. Secur.
|
| 2022 | J | jnl |
Frontiers Comput. Sci.
|
| 2021 | C | conf |
QSHINE
|
| 2021 | — | conf |
CRYPTO (1)
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2021 | A* | conf |
INFOCOM
|
| 2021 | J | jnl |
IEEE Trans. Emerg. Top. Comput.
|
| 2021 | A | conf |
AsiaCCS
|
| 2021 | — | conf |
ESORICS (2)
|
| 2021 | C | ed. |
ISC
|
| 2021 | J | jnl |
Des. Codes Cryptogr.
|
| 2021 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | C | conf |
ISPEC
|
| 2021 | A* | conf |
NDSS
|
| 2021 | — | conf |
Blockchain
|
| 2021 | — | conf |
Blockchain
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | A* | conf |
NDSS
|
| 2021 | C | conf |
ISPEC
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | — | conf |
ACNS (1)
|
| 2021 | Misc | conf |
ACISP
|
| 2021 | J | jnl |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
|
| 2020 | — | conf |
ACNS (2)
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2020 | J | jnl |
Inf. Sci.
|
| 2020 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2020 | Misc | conf |
SAC
|
| 2020 | J | jnl |
IEEE Internet Things J.
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | Misc | ed. |
ACISP
|
| 2020 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
IEEE Trans. Emerg. Top. Comput.
|
| 2020 | — | conf |
Public Key Cryptography (1)
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | — | conf |
Financial Cryptography
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | — | conf |
BSCI
|
| 2019 | Misc | conf |
ACISP
|
| 2019 | J | jnl |
Theor. Comput. Sci.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | Misc | conf |
Inscrypt
|
| 2019 | — | conf |
ESORICS (1)
|
| 2019 | B | conf |
CANS
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
ESORICS (2)
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | J | jnl |
J. Parallel Distributed Comput.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | Misc | conf |
ACISP
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | — | conf |
ESORICS (2)
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A | conf |
AsiaCCS
|
| 2019 | Misc | conf |
ACISP
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | — | conf |
CRYPTO (1)
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | A* | conf |
CCS
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | B | ed. |
NSS
|
| 2019 | A | conf |
AsiaCCS
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2019 | Misc | conf |
Inscrypt
|
| 2019 | — | ch. |
Advances in Cyber Security
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | Misc | conf |
ACISP
|
| 2019 | J | jnl |
CoRR
|
| 2019 | B | conf |
CANS
|
| 2019 | B | conf |
ACNS
|
| 2019 | B | conf |
ACNS
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | A | conf |
CSF
|
| 2019 | J | jnl |
J. Univers. Comput. Sci.
|
| 2018 | Misc | conf |
Inscrypt
|
| 2018 | J | jnl |
IEEE Commun. Mag.
|
| 2018 | J | jnl |
Inf. Sci.
|
| 2018 | B | conf |
NSS
|
| 2018 | Misc | conf |
Inscrypt
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2018 | Misc | conf |
Inscrypt
|
| 2018 | Misc | conf |
Inscrypt
|
| 2018 | C | conf |
ISPEC
|
| 2018 | — | conf |
ESORICS (2)
|
| 2018 | Misc | conf |
Inscrypt
|
| 2018 | J | jnl |
Soft Comput.
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2018 | — | conf |
ICA3PP (4)
|
| 2018 | J | jnl |
Int. J. Embed. Syst.
|
| 2018 | J | jnl |
IEEE Cloud Comput.
|
| 2018 | C | conf |
ISPEC
|
| 2018 | — | conf |
TrustCom/BigDataSE
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | C | conf |
ISC
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | B | conf |
NSS
|
| 2018 | Misc | conf |
ACISP
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | A* | conf |
CCS
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2018 | A* | conf |
CCS
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | J | jnl |
Wirel. Commun. Mob. Comput.
|
| 2018 | J | jnl |
Cryptogr.
|
| 2018 | Misc | conf |
ACISP
|
| 2018 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | B | conf |
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
ACNS
|
| 2018 | J | jnl |
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch.
|
| 2018 | — | conf |
ESORICS (2)
|
| 2018 | — | conf |
TrustCom/BigDataSE
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2017 | C | conf |
ICICS
|
| 2017 | C | conf |
ProvSec
|
| 2017 | J | jnl |
J. Comput. Syst. Sci.
|
| 2017 | J | jnl |
Int. J. Appl. Cryptogr.
|
| 2017 | C | conf |
ICIS
|
| 2017 | J | jnl |
Comput. J.
|
| 2017 | — | conf |
TrustCom/BigDataSE/ICESS
|
| 2017 | — | conf |
ACISP (1)
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2017 | J | jnl |
Pers. Ubiquitous Comput.
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | C | ed. |
ISPEC
|
| 2017 | — | conf |
ACISP (1)
|
| 2017 | — | conf |
ESORICS (2)
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
Pers. Ubiquitous Comput.
|
| 2017 | C | conf |
ProvSec
|
| 2017 | — | conf |
ACISP (1)
|
| 2017 | J | jnl |
Soft Comput.
|
| 2016 | — | conf |
Trustcom/BigDataSE/ISPA
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | — | conf |
ESORICS (1)
|
| 2016 | C | conf |
ISPEC
|
| 2016 | A | conf |
AsiaCCS
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | A | conf |
AsiaCCS
|
| 2016 | A | conf |
AsiaCCS
|
| 2016 | B | conf |
NSS
|
| 2016 | A | conf |
AsiaCCS
|
| 2016 | J | jnl |
Comput. J.
|
| 2016 | J | jnl |
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing.
Future Gener. Comput. Syst.
|
| 2016 | J | jnl |
Comput. J.
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | — | ed. |
ACISP (1)
|
| 2016 | — | ed. |
ACISP (2)
|
| 2016 | J | jnl |
Theor. Comput. Sci.
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | J | jnl |
Comput. J.
|
| 2016 | J | jnl |
Pervasive Mob. Comput.
|
| 2016 | C | conf |
ProvSec
|
| 2016 | — | conf |
Trustcom/BigDataSE/ISPA
|
| 2016 | — | conf |
Trustcom/BigDataSE/ISPA
|
| 2016 | J | jnl |
IEEE Trans. Computers
|
| 2016 | B | conf |
NSS
|
| 2015 | Misc | conf |
ACISP
|
| 2015 | J | jnl |
J. Univers. Comput. Sci.
|
| 2015 | J | jnl |
IEEE Trans. Cloud Comput.
|
| 2015 | J | jnl |
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst.
|
| 2015 | A | conf |
AsiaCCS
|
| 2015 | J | jnl |
Comput. J.
|
| 2015 | J | jnl |
Int. J. Embed. Syst.
|
| 2015 | J | jnl |
IEEE Trans. Computers
|
| 2015 | J | jnl |
Comput. J.
|
| 2015 | — | conf |
ESORICS (2)
|
| 2015 | C | conf |
ProvSec
|
| 2015 | — | conf |
LightSec
|
| 2015 | J | jnl |
Secur. Commun. Networks
|
| 2015 | B | conf |
ICPADS
|
| 2015 | — | conf |
ESORICS (1)
|
| 2015 | J | jnl |
IEEE Internet Comput.
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | C | conf |
ICICS
|
| 2015 | J | jnl |
IEEE Netw.
|
| 2015 | J | jnl |
Future Gener. Comput. Syst.
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | J | jnl |
Future Gener. Comput. Syst.
|
| 2015 | J | jnl |
Inf. Sci.
|
| 2015 | J | jnl |
IEEE Trans. Computers
|
| 2014 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2014 | J | jnl |
IEEE Trans. Veh. Technol.
|
| 2014 | J | jnl |
J. Ambient Intell. Humaniz. Comput.
|
| 2014 | — | conf |
ESORICS (1)
|
| 2014 | J | jnl |
Soft Comput.
|
| 2014 | C | conf |
ICICS
|
| 2014 | B | conf |
NSS
|
| 2014 | — | conf |
ESORICS (1)
|
| 2014 | J | jnl |
Expert Syst. Appl.
|
| 2014 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2014 | — | conf |
ESORICS (2)
|
| 2014 | C | ed. |
ProvSec
|
| 2014 | C | conf |
ISPEC
|
| 2014 | J | jnl |
IEEE Netw.
|
| 2013 | J | jnl |
IEEE Commun. Lett.
|
| 2013 | J | jnl |
Comput. J.
|
| 2013 | A | conf |
AsiaCCS
|
| 2013 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | J | jnl |
Theor. Comput. Sci.
|
| 2013 | J | jnl |
IEEE Pervasive Comput.
|
| 2013 | B | conf |
NSS
|
| 2013 | C | conf |
ProvSec
|
| 2012 | C | conf |
ProvSec
|
| 2012 | A | conf |
ESORICS
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | C | conf |
ICICS
|
| 2012 | A | conf |
AsiaCCS
|
| 2011 | C | conf |
ICICS
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | Misc | conf |
ACISP
|
| 2011 | A | conf |
AsiaCCS
|
| 2011 | — | conf |
Networking Workshops
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | A | conf |
AsiaCCS
|
| 2010 | C | conf |
ProvSec
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | J | jnl |
Int. J. Inf. Sec.
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | Misc | conf |
Inscrypt
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | A | conf |
AsiaCCS
|
| 2010 | A | conf |
ESORICS
|
| 2009 | B | conf |
ACNS
|
| 2009 | B | conf |
ACNS
|
| 2009 | — | conf |
WISEC
|
| 2009 | C | conf |
ICICS
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | C | conf |
ISC
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | J | jnl |
J. Univers. Comput. Sci.
|
| 2008 | Misc | conf |
SCN
|
| 2008 | A* | conf |
NDSS
|
| 2008 | B | conf |
CANS
|
| 2008 | J | jnl |
Int. J. Netw. Secur.
|
| 2008 | B | conf |
ACNS
|
| 2007 | C | conf |
ICICS
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | J | jnl |
Int. J. Netw. Secur.
|
| 2007 | C | conf |
ISPEC
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | C | ed. |
ProvSec
|
| 2007 | J | jnl |
J. Comput. Sci. Technol.
|
| 2006 | Misc | conf |
INDOCRYPT
|
| 2006 | J | jnl |
Int. J. Found. Comput. Sci.
|
| 2006 | Misc | conf |
IWSEC
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | Misc | conf |
IWSEC
|
| 2006 | A | conf |
AsiaCCS
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | — | conf |
ICCSA (4)
|
| 2005 | C | conf |
ISPEC
|
| 2005 | J | jnl |
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity.
IACR Cryptol. ePrint Arch.
|
| 2005 | — | conf |
ESAS
|
| 2005 | — | conf |
ICCSA (2)
|
| 2005 | — | conf |
EuroPKI
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | — | conf |
CISC
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | Misc | conf |
SEC
|
| 2005 | Misc | conf |
ICISC
|
| 2004 | — | conf |
ESAS
|
| 2004 | Misc | conf |
WISA
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | Misc | conf |
ACISP
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | Misc | conf |
ICISC
|
| 2004 | Misc | conf |
INDOCRYPT
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | Misc | conf |
ICISC
|
| 2003 | B | conf |
ICALT
|
| 2003 | C | conf |
ICICS
|