| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2013 | J | jnl |
Mob. Networks Appl.
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | A* | conf |
FSE
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
J. Comput. Secur.
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | C | conf |
SIN
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | — | conf |
Security Protocols Workshop
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | — | conf |
IWSEC (Short Papers)
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | J | jnl |
Inf. Comput.
|