| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2014 | J | jnl |
EAI Endorsed Trans. Collab. Comput.
|
| 2013 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2012 | C | conf |
SECRYPT
|
| 2012 | C | conf |
SECRYPT
|
| 2012 | A | conf |
ESORICS
|
| 2011 | B | conf |
DBSec
|
| 2011 | A* | conf |
ICDE
|
| 2011 | B | conf |
DBSec
|
| 2011 | B | conf |
ACNS
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | conf |
SocialCom/PASSAT
|
| 2010 | C | conf |
SECRYPT
|
| 2010 | A | conf |
ESORICS
|
| 2010 | — | conf |
PAKDD (1)
|
| 2010 | — | ed. |
WPES
|
| 2010 | A | conf |
AsiaCCS
|
| 2010 | — | conf |
ICETE (Selected Papers)
|
| 2009 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2009 | — | conf |
WPES
|
| 2009 | B | conf |
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation.
DBSec
|
| 2009 | C | conf |
ISC
|
| 2008 | — | conf |
WISEC
|
| 2008 | — | conf |
Financial Cryptography
|
| 2008 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2008 | A | conf |
AsiaCCS
|
| 2008 | — | conf |
WPES
|
| 2007 | A | conf |
AsiaCCS
|
| 2007 | A | conf |
ESORICS
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | B | conf |
ACNS
|
| 2006 | J | jnl |
IEEE Trans. Computers
|
| 2006 | — | conf |
Financial Cryptography
|
| 2006 | C | conf |
SACMAT
|
| 2006 | C | conf |
ICICS
|
| 2006 | — | conf |
WPES
|
| 2006 | A* | conf |
NDSS
|
| 2005 | — | conf |
Financial Cryptography
|
| 2005 | A* | conf |
CCS
|
| 2005 | A | conf |
ICDT
|
| 2005 | A* | conf |
EC
|
| 2005 | — | conf |
ACSW
|
| 2005 | — | conf |
Financial Cryptography
|
| 2005 | — | — |
|
| 2004 | — | ch. |
The Practical Handbook of Internet Computing
|
| 2004 | J | jnl |
IEEE Data Eng. Bull.
|
| 2004 | — | conf |
WPES
|
| 2004 | — | conf |
WPES
|
| 2004 | — | conf |
ICPS
|
| 2004 | — | conf |
WPES
|
| 2003 | B | conf |
WADS
|
| 2003 | — | conf |
WPES
|
| 2003 | C | conf |
DEXA
|
| 2002 | C | conf |
DEXA
|