| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | — | conf |
ESORICS (2)
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
Des. Codes Cryptogr.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | A* | conf |
NDSS
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | A | conf |
WACV
|
| 2025 | — | conf |
SIGMETRICS (Abstracts)
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | J | jnl |
Frontiers Comput. Sci.
|
| 2025 | A* | conf |
CCS
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Comput. Secur.
|
| 2025 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2025 | — | ed. |
ASPLOS (1)
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | B | conf |
IEEE Big Data
|
| 2024 | — | ed. |
ESORICS (1)
|
| 2024 | — | ed. |
ESORICS (2)
|
| 2024 | — | ed. |
ESORICS (3)
|
| 2024 | — | ed. |
ESORICS (4)
|
| 2024 | J | jnl |
IEEE Trans. Big Data
|
| 2024 | — | conf |
ESORICS (3)
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | A | conf |
CSF
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Proc. ACM Meas. Anal. Comput. Syst.
|
| 2024 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | — | conf |
ESORICS (4)
|
| 2024 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2024 | J | jnl |
IEEE J. Emerg. Sel. Topics Circuits Syst.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2023 | B | conf |
TrustCom
|
| 2023 | — | conf |
ASIACRYPT (5)
|
| 2023 | J | jnl |
Comput. J.
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | C | conf |
SACMAT
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
CoRR
|
| 2023 | Misc | conf |
ICASSP
|
| 2023 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2023 | J | jnl |
IEEE Trans. Artif. Intell.
|
| 2023 | J | jnl |
IEEE Trans. Cloud Comput.
|
| 2023 | J | jnl |
J. Inf. Secur. Appl.
|
| 2023 | C | ed. |
SecureComm
|
| 2023 | A* | conf |
NDSS
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
BlockTEA
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A* | conf |
CVPR
|
| 2022 | — | conf |
ESORICS (2)
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2022 | C | conf |
ACML
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Access
|
| 2022 | — | conf |
BlockTEA
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | — | conf |
ESORICS (2)
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A | conf |
ACSAC
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
ESORICS (1)
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2022 | Misc | conf |
ICASSP
|
| 2022 | J | jnl |
J. Syst. Softw.
|
| 2022 | J | jnl |
Des. Codes Cryptogr.
|
| 2022 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2022 | J | jnl |
IEEE Internet Comput.
|
| 2022 | J | jnl |
Comput. J.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
ESORICS (1)
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | Misc | conf |
ICASSP
|
| 2021 | J | jnl |
Computer
|
| 2021 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2021 | J | jnl |
Neurocomputing
|
| 2021 | J | jnl |
IEEE Trans. Serv. Comput.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | Misc | conf |
ICASSP
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2021 | — | conf |
Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum.
CYSARM@CCS
|
| 2020 | J | jnl |
IEEE Netw.
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2020 | — | ed. |
ESORICS (1)
|
| 2020 | — | ed. |
ESORICS (2)
|
| 2020 | — | conf |
CSCloud/EdgeCom
|
| 2020 | — | conf |
CollaborateCom (1)
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | ed. |
FCS
|
| 2020 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2020 | J | jnl |
Comput. J.
|
| 2020 | J | jnl |
Int. J. Distributed Sens. Networks
|
| 2020 | J | jnl |
Comput. J.
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
Future Gener. Comput. Syst.
|
| 2020 | J | jnl |
IEEE Internet Things J.
|
| 2020 | J | jnl |
IEEE Wirel. Commun.
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | J | jnl |
Secur. Commun. Networks
|
| 2019 | J | jnl |
J. Univers. Comput. Sci.
|
| 2019 | B | conf |
NSS
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
Comput. J.
|
| 2019 | J | jnl |
Inf. Sci.
|
| 2019 | J | jnl |
IEEE Syst. J.
|
| 2019 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2019 | J | jnl |
Future Gener. Comput. Syst.
|
| 2019 | J | jnl |
Symmetry
|
| 2019 | B | conf |
NetSoft
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | J | jnl |
IEEE Internet Things J.
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | J | jnl |
ACM Trans. Intell. Syst. Technol.
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2018 | J | jnl |
IEEE Trans. Ind. Informatics
|
| 2018 | J | jnl |
IEEE Access
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | J | jnl |
Soft Comput.
|
| 2018 | J | jnl |
Sensors
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2018 | B | conf |
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
ACNS
|
| 2018 | J | jnl |
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch.
|
| 2017 | C | conf |
GPC
|
| 2017 | C | conf |
ProvSec
|
| 2017 | C | conf |
CLOSER
|
| 2017 | J | jnl |
Pers. Ubiquitous Comput.
|
| 2017 | C | conf |
GPC
|
| 2017 | C | conf |
ISPEC
|
| 2017 | J | jnl |
Int. J. Found. Comput. Sci.
|
| 2017 | J | jnl |
Comput. J.
|
| 2016 | — | conf |
ACISP (1)
|
| 2016 | B | conf |
NSS
|
| 2016 | Misc | conf |
UbiComp
|
| 2016 | J | jnl |
Comput. J.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | J | jnl |
Int. J. Inf. Sec.
|
| 2016 | — | conf |
ACISP (2)
|
| 2016 | A | conf |
AsiaCCS
|
| 2016 | C | conf |
ProvSec
|
| 2016 | — | conf |
ESORICS (2)
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2016 | — | conf |
ACISP (1)
|
| 2016 | J | jnl |
Pervasive Mob. Comput.
|
| 2016 | J | jnl |
IEEE Trans. Computers
|
| 2016 | B | conf |
NSS
|
| 2015 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2015 | J | jnl |
Secur. Commun. Networks
|
| 2015 | J | jnl |
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst.
|
| 2015 | J | jnl |
IEEE Trans. Computers
|
| 2015 | J | jnl |
Comput. J.
|
| 2015 | — | conf |
ESORICS (2)
|
| 2015 | J | jnl |
IEEE Internet Comput.
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2015 | C | conf |
ICICS
|
| 2015 | J | jnl |
IEEE Netw.
|
| 2014 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2014 | C | conf |
ISPEC
|
| 2014 | — | conf |
ESORICS (1)
|
| 2014 | J | jnl |
Theor. Comput. Sci.
|
| 2014 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2014 | C | conf |
ProvSec
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
INCoS
|
| 2013 | C | conf |
ISPEC
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | Misc | conf |
ICISC
|