| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
IEEE Access
|
| 2025 | J | jnl |
Internet Things
|
| 2025 | J | jnl |
IEEE Netw. Lett.
|
| 2025 | J | jnl |
Comput. Networks
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Comput. Secur.
|
| 2023 | J | jnl |
Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset.
CoRR
|
| 2022 | J | jnl |
Digit. Investig.
|
| 2022 | J | jnl |
Behav. Inf. Technol.
|
| 2022 | J | jnl |
IEEE Internet Things J.
|
| 2022 | Misc | conf |
UCC
|
| 2022 | — | conf |
EICC
|
| 2021 | J | jnl |
Comput. Secur.
|
| 2021 | Misc | conf |
SEC
|
| 2021 | J | jnl |
CoRR
|
| 2020 | — | conf |
NordSec
|
| 2020 | Misc | conf |
NordiCHI
|
| 2020 | — | conf |
DPM/CBT@ESORICS
|
| 2020 | J | jnl |
CoRR
|
| 2019 | — | conf |
CHI Extended Abstracts
|
| 2019 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | J | jnl |
Comput.
|
| 2017 | — | conf |
CHI Extended Abstracts
|
| 2017 | — | conf |
INTERACT (3)
|
| 2017 | Misc | conf |
OZCHI
|
| 2016 | C | conf |
WISTP
|
| 2016 | A* | conf |
CHI
|
| 2016 | J | jnl |
J. Circuits Syst. Comput.
|
| 2016 | J | jnl |
Adv. Softw. Eng.
|
| 2016 | — | conf |
CS2@HiPEAC
|
| 2015 | J | jnl |
Inf. Comput. Secur.
|
| 2015 | J | jnl |
CoRR
|
| 2015 | A* | conf |
PerCom
|
| 2015 | B | conf |
MobileHCI
|
| 2014 | C | conf |
SIN
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
CoRR
|
| 2013 | — | conf |
Financial Cryptography
|
| 2013 | — | conf |
CHI Extended Abstracts
|
| 2013 | — | conf |
TRUST
|
| 2013 | — | conf |
Mobile HCI
|
| 2012 | — | conf |
ICITST
|
| 2012 | C | conf |
ICEC
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2010 | — | conf |
BCS HCI
|
| 2010 | — | conf |
Financial Cryptography
|
| 2009 | A | conf |
SOUPS
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2004 | J | jnl |
IEEE Secur. Priv.
|
| 2004 | J | jnl |
RFC
|
| 2003 | — | conf |
ADHOC-NOW
|
| 1999 | A* | conf |
NDSS
|
| 1998 | A* | conf |
NDSS
|
| 1996 | A | conf |
ASIACRYPT
|
| 1994 | A* | conf |
CCS
|