| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | A* | conf |
ICML
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
ICML
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2018 | — | conf |
ECCV (4)
|
| 2018 | J | jnl |
CoRR
|
| 2011 | — | ch. |
Formal Models and Techniques for Analyzing Security Protocols
|
| 2010 | J | jnl |
J. Comput. Secur.
|
| 2009 | — | conf |
ARSPA-WITS
|
| 2008 | J | jnl |
Int. J. Inf. Sec.
|
| 2007 | A* | conf |
CRYPTO
|
| 2007 | A | conf |
ESORICS
|
| 2006 | — | conf |
ICS@SYNASC
|
| 2006 | — | conf |
Formal Aspects in Security and Trust
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | — | conf |
VISSAS
|
| 2005 | A | conf |
ESOP
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | — | conf |
Formal Aspects in Security and Trust
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | — | conf |
Formal Aspects in Security and Trust
|
| 2004 | — | conf |
ARSPA@IJCAR
|
| 2003 | B | conf |
CSL
|