| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
CoRR
|
| 2013 | J | jnl |
Comput. Networks
|
| 2012 | J | jnl |
ERCIM News
|
| 2011 | J | jnl |
Comput. Networks
|
| 2011 | — | — |
|
| 2011 | B | conf |
PAM
|
| 2011 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2011 | J | jnl |
CoRR
|
| 2011 | — | conf |
TMA
|
| 2010 | B | conf |
ICCCN
|
| 2010 | A* | conf |
USENIX Security Symposium
|
| 2010 | J | jnl |
Comput. Commun. Rev.
|
| 2009 | B | conf |
PAM
|
| 2009 | B | conf |
PAM
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
CoRR
|
| 2008 | J | jnl |
CoRR
|
| 2008 | J | jnl |
CoRR
|
| 2008 | — | conf |
NDA
|
| 2004 | B | conf |
MobiHoc
|