| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | C | conf |
ICBC
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | C | conf |
ICBC
|
| 2024 | J | jnl |
CoRR
|
| 2023 | — | conf |
BRAINS
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
Int. J. Intell. Robotics Appl.
|
| 2022 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CCF Trans. Pervasive Comput. Interact.
|
| 2021 | J | jnl |
CoRR
|
| 2020 | A | conf |
RAID
|
| 2020 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
MSCPES@CPSIoTWeek
|
| 2019 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2019 | C | conf |
SACMAT
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
IEEE Access
|
| 2019 | B | conf |
ISIT
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | ch. |
Computing and Software Science
|
| 2018 | J | jnl |
Comput. Ind.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
J. Inf. Technol.
|
| 2018 | — | book |
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | B | conf |
SMARTCOMP
|
| 2018 | — | conf |
BIS (Workshops)
|
| 2018 | J | jnl |
Comput. Chem. Eng.
|
| 2018 | — | conf |
Models, Mindsets, Meta
|
| 2017 | — | conf |
Models, Algorithms, Logics and Tools
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | conf |
EuroS&P Workshops
|
| 2017 | — | conf |
POST
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
GandALF
|
| 2016 | — | conf |
Semantics, Logics, and Calculi
|
| 2015 | — | conf |
ESORICS (1)
|
| 2015 | J | jnl |
Inf. Comput.
|
| 2014 | J | jnl |
Int. J. Softw. Tools Technol. Transf.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | — | conf |
HCI (24)
|
| 2014 | A | conf |
TACAS
|
| 2013 | B | conf |
FoSSaCS
|
| 2013 | — | conf |
GandALF
|
| 2013 | — | conf |
HCI (27)
|
| 2013 | — | conf |
TRUST
|
| 2013 | — | ed. |
TRUST
|
| 2013 | J | jnl |
Dagstuhl Reports
|
| 2012 | — | conf |
PAAR@IJCAR
|
| 2012 | — | conf |
CODASPY
|
| 2012 | J | jnl |
Perform. Evaluation
|
| 2011 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2011 | — | conf |
Haifa Verification Conference
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | J | jnl |
Perform. Evaluation
|
| 2011 | — | conf |
Business Process Management Workshops (2)
|
| 2011 | C | conf |
SACMAT
|
| 2011 | — | conf |
Haifa Verification Conference
|
| 2010 | — | conf |
NordSec
|
| 2010 | A | conf |
ESORICS
|
| 2010 | J | jnl |
Math. Struct. Comput. Sci.
|
| 2010 | J | jnl |
Perform. Evaluation
|
| 2010 | — | ch. |
Insider Threats in Cyber Security
|
| 2010 | — | conf |
QEST
|
| 2009 | J | jnl |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol.
|
| 2009 | J | jnl |
Int. J. Softw. Tools Technol. Transf.
|
| 2009 | B | conf |
FCT
|
| 2009 | — | conf |
FSTTCS
|
| 2008 | J | jnl |
Bull. EATCS
|
| 2008 | A | conf |
CSF
|
| 2008 | B | conf |
FoSSaCS
|
| 2008 | — | conf |
EXPRESS
|
| 2008 | — | conf |
RP
|
| 2008 | — | conf |
QEST
|
| 2008 | B | conf |
VMCAI
|
| 2008 | J | jnl |
Theor. Comput. Sci.
|
| 2007 | — | conf |
FMSE
|
| 2007 | A* | conf |
CAV
|
| 2007 | B | conf |
VMCAI
|
| 2007 | — | conf |
AVoCS
|
| 2007 | — | conf |
AVoCS
|
| 2007 | J | jnl |
Int. J. Softw. Tools Technol. Transf.
|
| 2007 | A | ed. |
TACAS
|
| 2006 | B | conf |
MFPS
|
| 2006 | — | conf |
MFCSIT
|
| 2006 | B | conf |
ATVA
|
| 2005 | B | conf |
MFPS
|
| 2005 | J | jnl |
Log. Methods Comput. Sci.
|
| 2005 | A* | conf |
LICS
|
| 2005 | J | jnl |
Theor. Comput. Sci.
|
| 2005 | — | ed. |
AVoCS
|
| 2005 | J | jnl |
Formal Aspects Comput.
|
| 2004 | J | jnl |
Math. Struct. Comput. Sci.
|
| 2004 | — | conf |
QAPL
|
| 2004 | — | conf |
Validation of Stochastic Systems
|
| 2004 | A* | conf |
LICS
|
| 2004 | J | jnl |
CoRR
|
| 2004 | — | book |
Logic in computer science - modelling and reasoning about systems (2. ed.).
|
| 2004 | J | jnl |
ACM SIGCSE Bull.
|
| 2004 | — | conf |
ISoLA (Preliminary proceedings)
|
| 2004 | — | conf |
AVoCS
|
| 2004 | — | conf |
MFCSIT
|
| 2002 | — | conf |
Workshop on Domains
|
| 2002 | B | conf |
VMCAI
|
| 2002 | — | conf |
PAPM-PROBMIV
|
| 2001 | J | jnl |
Reliab. Comput.
|
| 2001 | B | conf |
CONCUR
|
| 2001 | A | conf |
ESOP
|
| 2001 | B | conf |
MFPS
|
| 2001 | — | book |
Secure communicating systems - design, analysis, and implementation.
|
| 2000 | J | jnl |
Math. Struct. Comput. Sci.
|
| 2000 | — | book |
Logic in computer science - modelling and reasoning about systems.
|
| 1999 | — | conf |
FSTTCS
|
| 1999 | — | conf |
SPIN
|
| 1999 | — | ed. |
PROBMIV
|
| 1999 | J | jnl |
Appl. Categorical Struct.
|
| 1998 | — | conf |
PROCOMET
|
| 1998 | — | conf |
PROBMIV
|
| 1997 | B | conf |
CSL
|
| 1997 | B | conf |
MFPS
|
| 1997 | A* | conf |
LICS
|
| 1997 | — | conf |
US-Brazil Joint Workshops on the Formal Foundations of Software Systems
|
| 1995 | J | jnl |
Inf. Comput.
|
| 1994 | J | jnl |
Theor. Comput. Sci.
|
| 1994 | — | conf |
Theory and Formal Methods
|
| 1994 | A* | conf |
LICS
|
| 1993 | B | conf |
MFPS
|
| 1993 | — | conf |
Theory and Formal Methods
|
| 1991 | B | conf |
MFPS
|