| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2008 | — | conf |
ISSE
|
| 2006 | — | conf |
Security and Management
|
| 2000 | J | jnl |
Comput. Secur.
|
| 2000 | J | jnl |
Comput. Secur.
|
| 2000 | J | jnl |
Comput. Secur.
|
| 1997 | J | jnl |
Comput. Secur.
|
| 1988 | J | jnl |
IEEE Netw.
|
| 1987 | J | jnl |
IEEE Netw.
|
| 1986 | — | conf |
FJCC
|
| 1983 | — | conf |
ACM Annual Conference
|
| 1983 | J | jnl |
Inf. Process. Lett.
|
| 1982 | J | jnl |
Comput. Secur.
|
| 1982 | J | jnl |
Comput. Secur.
|
| 1982 | J | jnl |
Comput. Secur.
|
| 1980 | J | jnl |
IEEE Trans. Inf. Theory
|
| 1975 | J | jnl |
IEEE Trans. Inf. Theory
|