| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
J. Inf. Process.
|
| 2021 | J | jnl |
IET Cyper-Phys. Syst.: Theory & Appl.
|
| 2021 | J | jnl |
IEEE Internet Things J.
|
| 2021 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
HOST
|
| 2020 | B | conf |
TrustCom
|
| 2020 | — | conf |
SmartIoT
|
| 2020 | A | conf |
AsiaCCS
|
| 2019 | J | jnl |
Int. J. Inf. Comput. Secur.
|
| 2018 | J | jnl |
Future Gener. Comput. Syst.
|
| 2017 | C | conf |
WISTP
|
| 2017 | — | ch. |
Smart Cards, Tokens, Security and Applications, 2nd Ed.
|
| 2017 | — | conf |
SpaCCS Workshops
|
| 2017 | — | ch. |
Smart Cards, Tokens, Security and Applications, 2nd Ed.
|
| 2017 | B | conf |
ARES
|
| 2017 | — | conf |
HOST
|
| 2017 | — | conf |
ICC
|
| 2017 | — | ch. |
Smart Cards, Tokens, Security and Applications, 2nd Ed.
|
| 2017 | — | conf |
TrustCom/BigDataSE/ICESS
|
| 2017 | C | conf |
WISTP
|
| 2017 | Misc | conf |
SAC
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | ch. |
Smart Cards, Tokens, Security and Applications, 2nd Ed.
|
| 2017 | — | book |
Smart Cards, Tokens, Security and Applications, 2nd Ed.
|
| 2017 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2017 | — | ch. |
Smart Cards, Tokens, Security and Applications, 2nd Ed.
|
| 2016 | — | conf |
IntelliSys (2)
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
RFIDSec
|
| 2016 | — | conf |
Trustcom/BigDataSE/ISPA
|
| 2016 | Misc | conf |
Inscrypt
|
| 2016 | — | conf |
Trustcom/BigDataSE/ISPA
|
| 2016 | J | jnl |
CoRR
|
| 2016 | C | conf |
SecureComm
|
| 2016 | — | conf |
IEEE RFID
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
Future Gener. Comput. Syst.
|
| 2015 | — | conf |
ICB
|
| 2015 | B | conf |
ARES
|
| 2015 | — | conf |
TrustCom/BigDataSE/ISPA (1)
|
| 2015 | — | conf |
ESORICS (2)
|
| 2015 | — | conf |
TrustCom/BigDataSE/ISPA (1)
|
| 2015 | B | conf |
NSS
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | C | conf |
WISTP
|
| 2014 | — | conf |
AINA Workshops
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | — | conf |
ICEBE
|
| 2014 | — | conf |
CyberC
|
| 2014 | C | conf |
CRiSIS
|
| 2014 | C | conf |
ISPEC
|
| 2014 | J | jnl |
Int. J. Secur. Softw. Eng.
|
| 2014 | — | conf |
DPM/SETOP/QASA
|
| 2014 | B | conf |
TrustCom
|
| 2014 | — | book |
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | — | conf |
NTMS
|
| 2014 | — | conf |
COSADE
|
| 2013 | — | conf |
TrustCom/ISPA/IUCC
|
| 2013 | Misc | conf |
SEC
|
| 2013 | — | conf |
ICITST
|
| 2013 | — | conf |
TrustCom/ISPA/IUCC
|
| 2013 | A | ed. |
ESORICS
|
| 2013 | — | conf |
HPCC/EUC
|
| 2013 | — | conf |
RFIDSec Asia
|
| 2013 | C | conf |
ICICS
|
| 2013 | — | conf |
ICEBE
|
| 2013 | C | conf |
SecureComm
|
| 2013 | B | conf |
NSS
|
| 2013 | — | conf |
SSCC
|
| 2013 | C | conf |
CARDIS
|
| 2012 | B | conf |
TrustCom
|
| 2012 | C | conf |
CIS
|
| 2012 | C | conf |
ICICS
|
| 2012 | C | conf |
CRiSIS
|
| 2012 | — | conf |
RFIDSec Asia
|
| 2012 | — | conf |
NTMS
|
| 2012 | — | conf |
ISSA
|
| 2011 | Misc | conf |
ACISP
|
| 2011 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2011 | B | conf |
TrustCom
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
Int. J. Intell. Inf. Database Syst.
|
| 2011 | — | conf |
ICEBE
|
| 2010 | Misc | conf |
SEC
|
| 2010 | — | conf |
ICCSA Workshops
|
| 2010 | — | conf |
AICT
|
| 2010 | — | conf |
M-MPAC@Middleware
|
| 2010 | J | jnl |
Int. J. Secur. Networks
|
| 2010 | C | conf |
CARDIS
|
| 2010 | — | conf |
RFIDSec
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | C | conf |
EUC
|
| 2010 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2010 | C | conf |
WISTP
|
| 2009 | B | conf |
ARES
|
| 2009 | Misc | conf |
WISA
|
| 2009 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2009 | J | jnl |
Comput. Secur.
|
| 2009 | — | conf |
OTM Workshops
|
| 2009 | — | conf |
ICITST
|
| 2009 | B | conf |
ACIIDS
|
| 2009 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2008 | C | conf |
CARDIS
|
| 2008 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2008 | — | conf |
ICEBE
|
| 2008 | C | conf |
ISI
|
| 2007 | C | conf |
WISTP
|
| 2007 | — | conf |
ICEBE
|
| 2007 | — | ch. |
Computational Intelligence in Information Assurance and Security
|
| 2006 | — | conf |
CEC/EEE
|
| 2006 | C | conf |
CARDIS
|
| 2006 | Misc | conf |
IWSEC
|
| 2006 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2006 | C | conf |
AICCSA
|
| 2006 | — | conf |
WOSIS
|
| 2005 | — | conf |
ACSW
|
| 2005 | Misc | conf |
SEC
|
| 2004 | — | conf |
Communications and Multimedia Security
|
| 2003 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 2003 | J | jnl |
Inf. Secur. Tech. Rep.
|