| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2026 | J | jnl |
IEEE Trans. Pattern Anal. Mach. Intell.
|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
ACL (1)
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
EMNLP
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
ICLR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
CCS
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Proc. ACM Program. Lang.
|
| 2025 | A* | conf |
ICML
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
SP
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
ACL (1)
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A | conf |
ICME
|
| 2025 | A* | conf |
SP
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
ICML
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
ICLR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
NDSS
|
| 2025 | A* | conf |
CCS
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
ACL (1)
|
| 2025 | J | jnl |
CoRR
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
NAACL-HLT (Findings)
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | Misc | conf |
ICASSP
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A | conf |
AsiaCCS
|
| 2024 | A | conf |
ICWSM
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A | conf |
Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models.
WACV
|
| 2024 | J | jnl |
Trans. Mach. Learn. Res.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A | conf |
ECAI
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2024 | A* | conf |
NeurIPS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
CCS
|
| 2024 | A* | conf |
SP
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
ICLR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
EMNLP
|
| 2024 | A* | conf |
NeurIPS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
ICML
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
EMNLP
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | A* | conf |
EMNLP
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
CCS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
NDSS
|
| 2023 | J | jnl |
Mach. Learn.
|
| 2023 | A* | conf |
NDSS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | A* | conf |
CVPR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
ICML
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models.
CoRR
|
| 2023 | A* | conf |
ICML
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
ICLR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
SP
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | C | conf |
SACMAT
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | A* | conf |
CCS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2022 | — | conf |
ESORICS (2)
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | A* | conf |
CCS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A | conf |
EuroS&P
|
| 2022 | A* | conf |
CCS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A* | conf |
CCS
|
| 2022 | A* | conf |
NDSS
|
| 2022 | A* | conf |
CCS
|
| 2022 | — | conf |
SOUPS @ USENIX Security Symposium
|
| 2022 | A* | conf |
USENIX Security Symposium
|
| 2022 | A* | conf |
USENIX Security Symposium
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A* | conf |
CCS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A | conf |
ICWSM
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A* | conf |
CCS
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A* | conf |
CCS
|
| 2021 | A* | conf |
CCS
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | A | conf |
CSF
|
| 2021 | A | conf |
ACSAC
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A | conf |
SDM
|
| 2021 | A* | conf |
CCS
|
| 2021 | A* | conf |
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions.
USENIX Security Symposium
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
CVPR Workshops
|
| 2021 | A | conf |
AsiaCCS
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | A | conf |
DSN
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A* | conf |
CCS
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2020 | A* | conf |
USENIX Security Symposium
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
ETRA Adjunct
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A | conf |
AsiaCCS
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Data Eng. Bull.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A* | conf |
SP
|
| 2020 | B | conf |
ICPR
|
| 2020 | A | conf |
EuroS&P
|
| 2020 | — | conf |
ICANN (1)
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A* | conf |
NDSS
|
| 2020 | — | conf |
ACNS (2)
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A | conf |
ACSAC
|
| 2020 | A* | conf |
USENIX Security Symposium
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A | conf |
CSF
|
| 2019 | — | conf |
CREST
|
| 2019 | — | conf |
Public Key Cryptography (1)
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | A* | conf |
IJCAI
|
| 2019 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2019 | A* | conf |
CCS
|
| 2019 | A | conf |
CSF
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | A | conf |
ACSAC
|
| 2019 | A* | conf |
NDSS
|
| 2019 | A* | conf |
NDSS
|
| 2019 | A* | conf |
CCS
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A* | conf |
CCS
|
| 2019 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
EUROCRYPT (3)
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2019 | Misc | conf |
SAC
|
| 2019 | A | conf |
EuroS&P
|
| 2019 | J | jnl |
CoRR
|
| 2018 | J | jnl |
ACM Comput. Surv.
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A* | conf |
USENIX Security Symposium
|
| 2018 | A* | conf |
NDSS
|
| 2018 | A | conf |
EuroS&P
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A | conf |
EuroS&P
|
| 2018 | B | conf |
DIMVA
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | — | conf |
ICC
|
| 2018 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2018 | A* | ed. |
CCS
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | — | conf |
ASIACRYPT (2)
|
| 2018 | J | jnl |
IEEE ACM Trans. Comput. Biol. Bioinform.
|
| 2018 | A* | conf |
AAAI
|
| 2018 | A* | conf |
WWW
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2017 | A | conf |
EuroS&P
|
| 2017 | A* | conf |
CCS
|
| 2017 | A | conf |
EuroS&P
|
| 2017 | — | conf |
ESORICS (2)
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2017 | A* | conf |
NDSS
|
| 2017 | A* | conf |
CCS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A | conf |
EuroS&P
|
| 2017 | J | jnl |
IEEE Secur. Priv.
|
| 2017 | A* | conf |
USENIX Security Symposium
|
| 2017 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2017 | A* | conf |
CCS
|
| 2017 | A | conf |
EuroS&P
|
| 2017 | — | conf |
CSET @ USENIX Security Symposium
|
| 2017 | A | conf |
RAID
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A | conf |
CSF
|
| 2017 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | A* | conf |
CCS
|
| 2017 | A* | conf |
NDSS
|
| 2017 | A* | conf |
WWW
|
| 2017 | A* | conf |
CCS
|
| 2017 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
J. Priv. Confidentiality
|
| 2016 | — | conf |
ESORICS (1)
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
login Usenix Mag.
|
| 2016 | A* | conf |
CCS
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2016 | — | conf |
Public Key Cryptography (1)
|
| 2016 | B | conf |
DIMVA
|
| 2016 | A* | conf |
CCS
|
| 2016 | — | conf |
FOSAD
|
| 2016 | J | jnl |
Datenschutz und Datensicherheit
|
| 2016 | A* | conf |
USENIX Security Symposium
|
| 2016 | A* | conf |
NDSS
|
| 2016 | A* | conf |
CCS
|
| 2016 | Misc | conf |
SAC
|
| 2016 | A* | conf |
CCS
|
| 2016 | A* | conf |
USENIX Security Symposium
|
| 2016 | — | conf |
WPES@CCS
|
| 2016 | A | conf |
RAID
|
| 2016 | A* | conf |
CCS
|
| 2016 | A* | conf |
CCS
|
| 2016 | J | jnl |
CoRR
|
| 2016 | A* | conf |
USENIX Security Symposium
|
| 2016 | A | conf |
AsiaCCS
|
| 2016 | A | conf |
AsiaCCS
|
| 2016 | A* | conf |
CCS
|
| 2016 | A | conf |
RAID
|
| 2016 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2016 | A* | conf |
USENIX Security Symposium
|
| 2016 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2016 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2015 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2015 | A* | conf |
USENIX Security Symposium
|
| 2015 | — | conf |
ESORICS (1)
|
| 2015 | — | conf |
SCC@ASIACCS
|
| 2015 | J | jnl |
CoRR
|
| 2015 | B | conf |
ACNS
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | A* | conf |
CCS
|
| 2015 | A* | conf |
CCS
|
| 2015 | J | jnl |
CoRR
|
| 2015 | — | conf |
POST
|
| 2015 | J | jnl |
Math. Struct. Comput. Sci.
|
| 2015 | B | conf |
ACNS
|
| 2015 | A | conf |
CSF
|
| 2014 | A* | conf |
CCS
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | A | conf |
ACSAC
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | A* | conf |
PODC
|
| 2014 | B | conf |
ACNS
|
| 2014 | — | conf |
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
POST
|
| 2014 | — | conf |
STM
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | A* | conf |
USENIX Security Symposium
|
| 2014 | A | conf |
ACSAC
|
| 2014 | A | conf |
CSF
|
| 2014 | J | jnl |
J. Comput. Secur.
|
| 2014 | B | conf |
ACNS
|
| 2014 | Misc | conf |
SAC
|
| 2014 | A* | conf |
CCS
|
| 2013 | A | conf |
CSF
|
| 2013 | A | conf |
TACAS
|
| 2013 | — | conf |
DPM/SETOP
|
| 2013 | B | conf |
CT-RSA
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
POST
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
DPM/SETOP
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
ESSoS
|
| 2013 | J | jnl |
CoRR
|
| 2013 | A* | conf |
NDSS
|
| 2013 | A | conf |
ESORICS
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
WPES
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | A* | conf |
CCS
|
| 2012 | — | conf |
WPES
|
| 2012 | A | conf |
AsiaCCS
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | A* | conf |
NDSS
|
| 2012 | A* | conf |
PODC
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | A* | conf |
CCS
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | — | conf |
ISVC (2)
|
| 2012 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2012 | — | conf |
NASA Formal Methods
|
| 2012 | J | jnl |
J. Comput. Secur.
|
| 2012 | A | conf |
CSF
|
| 2012 | A* | conf |
WWW
|
| 2012 | A | conf |
CSF
|
| 2011 | J | jnl |
CoRR
|
| 2011 | A* | conf |
NDSS
|
| 2011 | J | jnl |
CoRR
|
| 2011 | B | conf |
CPP
|
| 2011 | A | conf |
ASIACRYPT
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
Int. J. Inf. Sec.
|
| 2011 | — | conf |
TOSCA
|
| 2011 | A | conf |
AsiaCCS
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | A* | conf |
PODC
|
| 2011 | — | conf |
TOSCA
|
| 2011 | J | jnl |
CoRR
|
| 2010 | A* | conf |
USENIX Security Symposium
|
| 2010 | A | conf |
Privacy Enhancing Technologies
|
| 2010 | A* | conf |
PODC
|
| 2010 | J | jnl |
J. Comput. Secur.
|
| 2010 | — | conf |
FSTTCS
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | A* | conf |
CCS
|
| 2010 | A | conf |
ESORICS
|
| 2010 | A | conf |
ESORICS
|
| 2009 | A | conf |
CSF
|
| 2009 | — | conf |
OTM Conferences (1)
|
| 2009 | A* | conf |
SP
|
| 2009 | A* | conf |
NDSS
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | A* | conf |
CCS
|
| 2009 | A | ed. |
ESORICS
|
| 2009 | — | conf |
Security Protocols Workshop
|
| 2009 | — | conf |
Security Protocols Workshop
|
| 2009 | A* | conf |
SP
|
| 2008 | B | conf |
LPAR
|
| 2008 | A* | conf |
PODC
|
| 2008 | A | conf |
CSF
|
| 2008 | A* | conf |
SP
|
| 2008 | A | conf |
CSF
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | J | jnl |
Int. J. Inf. Sec.
|
| 2008 | A | conf |
ESORICS
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | J | jnl |
J. Comput. Secur.
|
| 2008 | A | conf |
ASIACRYPT
|
| 2008 | J | jnl |
Int. J. Inf. Sec.
|
| 2008 | A | conf |
ASIACRYPT
|
| 2008 | A* | conf |
CAV
|
| 2008 | A* | conf |
CCS
|
| 2008 | A* | conf |
SP
|
| 2007 | — | conf |
FMSE
|
| 2007 | A | conf |
CSF
|
| 2007 | — | conf |
S&P
|
| 2007 | A | conf |
CSF
|
| 2007 | — | conf |
FSTTCS
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | B | conf |
TCC
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | J | jnl |
Int. J. Inf. Sec.
|
| 2007 | J | jnl |
J. Comput. Secur.
|
| 2007 | — | ed. |
SecCo@CONCUR
|
| 2007 | J | jnl |
Inf. Comput.
|
| 2007 | — | conf |
Formal Protocol Verification Applied
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | J | jnl |
Theor. Comput. Sci.
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | A* | conf |
CCS
|
| 2006 | A | conf |
ESORICS
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | A | conf |
ESORICS
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | — | conf |
CSFW
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | B | conf |
FM
|
| 2006 | C | ed. |
ISC
|
| 2006 | A | conf |
ESORICS
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | Misc | conf |
SEC
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | A | conf |
ESORICS
|
| 2006 | B | conf |
FoSSaCS
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | — | conf |
CSFW
|
| 2005 | — | conf |
WPES
|
| 2005 | — | conf |
CSFW
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | — | conf |
IEEE Security in Storage Workshop
|
| 2005 | A | conf |
ESORICS
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | — | conf |
FMSE
|
| 2005 | — | conf |
SecCO@CONCUR
|
| 2005 | B | conf |
TCC
|
| 2005 | A | conf |
ESORICS
|
| 2005 | J | jnl |
Int. J. Inf. Sec.
|
| 2005 | B | conf |
MFPS
|
| 2005 | — | conf |
S&P
|
| 2005 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | J | jnl |
Int. J. Inf. Sec.
|
| 2005 | — | conf |
SWS
|
| 2005 | J | jnl |
J. Log. Algebraic Methods Program.
|
| 2004 | A | conf |
ESORICS
|
| 2004 | B | conf |
TCC
|
| 2004 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2004 | A | conf |
ESORICS
|
| 2004 | J | jnl |
Int. J. Inf. Sec.
|
| 2004 | — | — |
|
| 2004 | Misc | conf |
SAC
|
| 2004 | C | conf |
ISC
|
| 2004 | — | conf |
FOSAD
|
| 2004 | C | conf |
ISC
|
| 2004 | J | jnl |
J. Comput. Secur.
|
| 2004 | — | ed. |
FMSE
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | — | conf |
CSFW
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | — | conf |
POLICY
|
| 2003 | — | conf |
FSTTCS
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | A | conf |
ESORICS
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | A* | conf |
CCS
|
| 2003 | A | conf |
STACS
|
| 2003 | C | conf |
NSPW
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | — | conf |
S&P
|
| 2003 | A* | conf |
PODC
|
| 2003 | — | ed. |
FMSE
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | C | conf |
ISC
|
| 2003 | — | conf |
FMSE
|
| 2003 | A | conf |
DSN
|
| 2003 | A | conf |
Business Process Management
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2003 | A | conf |
ESORICS
|
| 2003 | B | conf |
CONCUR
|
| 2003 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2002 | A | conf |
ESORICS
|
| 2002 | — | conf |
FME
|
| 2002 | — | conf |
CSFW
|