| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2024 | C | conf |
ISNCC
|
| 2021 | J | jnl |
Comput. Networks
|
| 2021 | — | conf |
BIOMESIP
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | — | conf |
NCS
|
| 2020 | J | jnl |
Inf. Syst.
|
| 2019 | B | conf |
SERVICES
|
| 2019 | J | jnl |
Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures.
IEEE Internet Things J.
|
| 2018 | J | jnl |
Mob. Inf. Syst.
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | J | jnl |
Mob. Inf. Syst.
|
| 2017 | J | jnl |
Sensors
|
| 2017 | J | jnl |
Int. J. Inf. Sec.
|
| 2017 | J | jnl |
IEEE Trans Autom. Sci. Eng.
|
| 2017 | J | jnl |
Sensors
|
| 2016 | — | conf |
IEEE RFID
|
| 2016 | J | jnl |
Comput. Commun.
|
| 2016 | — | conf |
HICSS
|
| 2016 | — | conf |
Critical Infrastructure Protection
|
| 2016 | — | conf |
HICSS
|
| 2016 | — | conf |
UCAmI (2)
|
| 2016 | — | conf |
IoTBD
|
| 2016 | J | jnl |
IEEE Commun. Lett.
|
| 2016 | — | ed. |
UCAmI (1)
|
| 2016 | — | ed. |
UCAmI (2)
|
| 2015 | — | conf |
Critical Infrastructure Protection
|
| 2015 | C | conf |
ISI
|
| 2015 | — | conf |
Critical Infrastructure Protection
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | — | conf |
SBP
|
| 2014 | — | conf |
RFID-TA
|
| 2014 | J | jnl |
IEEE Wirel. Commun. Lett.
|
| 2013 | — | conf |
IISA
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
Critical Infrastructure Protection
|
| 2013 | C | conf |
ISCC
|
| 2013 | — | conf |
ISSNIP
|
| 2013 | — | conf |
MILCOM
|
| 2012 | C | conf |
CRITIS
|
| 2012 | J | jnl |
Comput. Networks
|
| 2012 | — | conf |
Cryptography and Security
|
| 2012 | J | jnl |
Int. J. Crit. Infrastructure Prot.
|
| 2012 | J | jnl |
Int. J. Ad Hoc Ubiquitous Comput.
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | conf |
Security Protocols Workshop
|
| 2011 | — | conf |
Security Protocols Workshop
|
| 2011 | C | ed. |
ISC
|
| 2011 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2010 | — | conf |
ACM Southeast Regional Conference
|
| 2009 | — | ch. |
Guide to Wireless Ad Hoc Networks
|
| 2009 | J | jnl |
IEEE Trans. Mob. Comput.
|
| 2009 | J | jnl |
Theor. Comput. Sci.
|
| 2009 | — | conf |
ADHOC-NOW
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2008 | J | jnl |
Int. J. Appl. Cryptogr.
|
| 2008 | C | conf |
COCOA
|
| 2008 | C | conf |
CARDIS
|
| 2008 | — | conf |
WISEC
|
| 2008 | A | conf |
AsiaCCS
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | B | conf |
WiMob
|
| 2008 | B | conf |
ACNS
|
| 2007 | J | jnl |
Ad Hoc Networks
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | — | conf |
Financial Cryptography
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | A | conf |
AsiaCCS
|
| 2006 | — | conf |
ACM Southeast Regional Conference
|
| 2006 | C | conf |
SecureComm
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | C | conf |
CRITIS
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | — | ed. |
MADNES
|
| 2006 | Misc | conf |
SAC
|
| 2006 | Misc | conf |
ACISP
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | B | conf |
ISAAC
|
| 2005 | J | jnl |
Inf. Process. Lett.
|
| 2005 | — | conf |
SADFE
|
| 2005 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | — | conf |
Security Protocols Workshop
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | conf |
MADNES
|
| 2005 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2005 | J | jnl |
SIGCAS Comput. Soc.
|
| 2004 | — | conf |
Security Protocols Workshop
|
| 2004 | Misc | conf |
SEC
|
| 2004 | J | jnl |
Commun. ACM
|
| 2004 | — | conf |
ITCC (2)
|
| 2004 | J | jnl |
Electron. Commer. Res.
|
| 2004 | — | conf |
ADHOC-NOW
|
| 2003 | — | conf |
Security Protocols Workshop
|
| 2003 | C | conf |
ISC
|
| 2003 | — | ch. |
Secure Electronic Voting
|
| 2001 | — | conf |
DEXA Workshop
|
| 2001 | — | conf |
Public Key Cryptography
|
| 2001 | — | conf |
I3E
|
| 2001 | Misc | conf |
SEC
|
| 2000 | — | conf |
Public Key Cryptography
|
| 2000 | — | conf |
EC-Web
|
| 2000 | J | jnl |
SIAM J. Discret. Math.
|
| 2000 | J | jnl |
Fundam. Informaticae
|
| 2000 | Misc | conf |
ACISP
|
| 2000 | J | jnl |
Future Gener. Comput. Syst.
|
| 2000 | A* | conf |
CCS
|
| 1999 | J | jnl |
J. Cryptol.
|
| 1999 | A | conf |
ASIACRYPT
|
| 1999 | C | conf |
IMACC
|
| 1998 | A | conf |
ASIACRYPT
|
| 1998 | A | conf |
ASIACRYPT
|
| 1998 | — | conf |
RANDOM
|
| 1997 | J | jnl |
Des. Codes Cryptogr.
|
| 1996 | — | conf |
Information Hiding
|
| 1996 | A* | conf |
EUROCRYPT
|
| 1996 | — | conf |
Security Protocols Workshop
|
| 1996 | Misc | conf |
SEC
|
| 1996 | A* | conf |
EUROCRYPT
|
| 1996 | — | conf |
Network Threats
|
| 1994 | A* | conf |
EUROCRYPT
|
| 1994 | A | conf |
ASIACRYPT
|
| 1994 | A* | conf |
CRYPTO
|
| 1993 | A* | conf |
EUROCRYPT
|
| 1993 | A* | conf |
CCS
|
| 1992 | J | jnl |
Inf. Process. Lett.
|
| 1992 | — | conf |
IFIP Congress (2)
|
| 1992 | J | jnl |
Comput. J.
|
| 1992 | A* | conf |
CRYPTO
|
| 1992 | — | conf |
IFIP Congress (2)
|
| 1991 | A | conf |
ASIACRYPT
|
| 1991 | A* | conf |
EUROCRYPT
|
| 1990 | A* | conf |
EUROCRYPT
|
| 1990 | A* | conf |
EUROCRYPT
|
| 1989 | A* | conf |
EUROCRYPT
|