| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2024 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2023 | J | jnl |
J. Comput. Inf. Sci. Eng.
|
| 2021 | J | jnl |
Inf. Sci.
|
| 2020 | J | jnl |
J. Comput. Inf. Sci. Eng.
|
| 2019 | J | jnl |
IEEE Trans. Cloud Comput.
|
| 2019 | J | jnl |
J. Comput. Inf. Sci. Eng.
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | J | jnl |
J. Comput. Inf. Sci. Eng.
|
| 2018 | J | jnl |
J. Comput. Inf. Sci. Eng.
|
| 2018 | J | jnl |
Adv. Eng. Informatics
|
| 2017 | J | jnl |
Inf. Process. Lett.
|
| 2017 | J | jnl |
J. Comput. Inf. Sci. Eng.
|
| 2017 | — | conf |
UEMCON
|
| 2016 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2016 | J | jnl |
Comput. Stand. Interfaces
|
| 2016 | A* | conf |
ICDE
|
| 2016 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2015 | Misc | conf |
SEC
|
| 2015 | A | conf |
ACSAC
|
| 2014 | J | jnl |
EAI Endorsed Trans. Collab. Comput.
|
| 2014 | J | jnl |
CoRR
|
| 2013 | J | jnl |
Inf. Process. Lett.
|
| 2013 | — | conf |
Security Protocols Workshop
|
| 2013 | J | jnl |
IEEE Trans. Engineering Management
|
| 2013 | C | conf |
ICICS
|
| 2012 | — | conf |
Cloud-I
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
ACM J. Data Inf. Qual.
|
| 2012 | J | jnl |
ACM J. Exp. Algorithmics
|
| 2012 | — | conf |
CODASPY
|
| 2012 | A | conf |
ICWS
|
| 2012 | C | conf |
SECRYPT
|
| 2012 | A | conf |
ESORICS
|
| 2011 | J | jnl |
ACM Trans. Database Syst.
|
| 2011 | — | ed. |
FAW-AAIM
|
| 2011 | J | jnl |
IEEE Softw.
|
| 2011 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2011 | J | jnl |
Inf. Process. Lett.
|
| 2011 | J | jnl |
IEEE Trans. Pattern Anal. Mach. Intell.
|
| 2011 | B | conf |
ACNS
|
| 2010 | Misc | conf |
FAW
|
| 2010 | A* | conf |
SODA
|
| 2010 | — | conf |
Insider Threats@CCS
|
| 2010 | — | conf |
DEXA (2)
|
| 2010 | A | ed. |
Privacy Enhancing Technologies
|
| 2010 | A | conf |
AsiaCCS
|
| 2009 | A* | conf |
PODS
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2009 | A* | conf |
ICDE
|
| 2009 | — | conf |
GIS
|
| 2009 | A | conf |
ICDT
|
| 2009 | J | jnl |
Comput. Graph. Forum
|
| 2009 | J | jnl |
Cyberpsychology Behav. Soc. Netw.
|
| 2009 | A | ed. |
Privacy Enhancing Technologies
|
| 2009 | C | conf |
ISC
|
| 2009 | J | jnl |
J. Comput. Secur.
|
| 2008 | J | jnl |
Inf. Process. Lett.
|
| 2008 | — | conf |
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity.
VMSec
|
| 2008 | A* | conf |
ICDE
|
| 2008 | A | conf |
ICDCS
|
| 2008 | A | conf |
ICDCS
|
| 2008 | C | conf |
ICIS
|
| 2008 | J | jnl |
Comput. Hum. Behav.
|
| 2008 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2008 | C | conf |
PST
|
| 2008 | A | conf |
AsiaCCS
|
| 2007 | B | conf |
WADS
|
| 2007 | A | conf |
AsiaCCS
|
| 2007 | A | conf |
ESORICS
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|
| 2007 | Misc | conf |
SAC
|
| 2007 | — | conf |
USENIX ATC
|
| 2006 | J | jnl |
Digit. Investig.
|
| 2006 | J | jnl |
IEEE Trans. Computers
|
| 2006 | — | conf |
Financial Cryptography
|
| 2006 | C | conf |
SACMAT
|
| 2006 | Misc | conf |
SAC
|
| 2006 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|
| 2006 | C | conf |
ICICS
|
| 2006 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2006 | C | conf |
CollaborateCom
|
| 2006 | Misc | conf |
COCOON
|
| 2006 | J | jnl |
VLDB J.
|
| 2006 | — | conf |
MM&Sec
|
| 2006 | A* | conf |
NDSS
|
| 2005 | — | conf |
ACSW
|
| 2005 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2005 | — | conf |
Financial Cryptography
|
| 2005 | J | jnl |
ACM J. Exp. Algorithmics
|
| 2005 | Misc | conf |
HiPC
|
| 2005 | A* | conf |
CCS
|
| 2005 | B | conf |
ACNS
|
| 2005 | A | conf |
SDM
|
| 2005 | A* | conf |
EC
|
| 2005 | C | conf |
SACMAT
|
| 2005 | J | jnl |
Knowl. Inf. Syst.
|
| 2005 | — | conf |
ACSW
|
| 2005 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2005 | — | conf |
Financial Cryptography
|
| 2005 | J | jnl |
Int. J. Inf. Sec.
|
| 2005 | — | conf |
Information Hiding
|
| 2005 | C | conf |
IWDW
|
| 2004 | — | conf |
MM&Sec
|
| 2004 | — | conf |
Security, Steganography, and Watermarking of Multimedia Contents
|
| 2004 | J | jnl |
Concurr. Pract. Exp.
|
| 2004 | A* | conf |
ICDM
|
| 2004 | — | ch. |
The Practical Handbook of Internet Computing
|
| 2004 | J | jnl |
IEEE Data Eng. Bull.
|
| 2004 | — | conf |
WPES
|
| 2004 | A | conf |
ESORICS
|
| 2004 | — | conf |
WPES
|
| 2004 | — | conf |
ICPS
|
| 2004 | — | conf |
ICBA
|
| 2004 | — | conf |
WPES
|
| 2004 | A* | conf |
VLDB
|
| 2004 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2004 | A | conf |
Privacy Enhancing Technologies
|
| 2004 | C | conf |
SACMAT
|
| 2004 | A* | conf |
ICDE
|
| 2003 | J | jnl |
Inf. Sci.
|
| 2003 | A* | conf |
INFOCOM
|
| 2003 | Misc | conf |
SAC
|
| 2003 | B | conf |
WADS
|
| 2003 | J | jnl |
Algorithmica
|
| 2003 | B | conf |
CEC
|
| 2003 | — | conf |
ITCC
|
| 2003 | — | conf |
WPES
|
| 2003 | A* | conf |
ICDM
|
| 2003 | C | conf |
DEXA
|
| 2003 | C | conf |
IWDW
|
| 2003 | — | conf |
SIGMOD Conference
|
| 2003 | B | conf |
CEC
|
| 2003 | — | conf |
WPES
|
| 2002 | B | conf |
ICPP
|
| 2002 | J | jnl |
Inf. Comput.
|
| 2002 | A | conf |
ECAI
|
| 2002 | — | conf |
Information Hiding
|
| 2002 | C | conf |
IWDW
|
| 2002 | — | conf |
PKDD
|
| 2002 | C | conf |
DEXA
|
| 2002 | — | conf |
RAODMAP@COLING
|
| 2001 | J | jnl |
Algorithmica
|
| 2001 | J | jnl |
IEEE Trans. Image Process.
|
| 2001 | — | conf |
Information Hiding
|
| 2001 | J | jnl |
Int. J. Comput. Geom. Appl.
|
| 2001 | J | jnl |
IEEE Trans. Computers
|
| 2001 | — | conf |
CSFW
|
| 2001 | A | conf |
ACSAC
|
| 2001 | — | conf |
Digital Rights Management Workshop
|
| 2001 | — | ch. |
E-Commerce Security and Privacy
|
| 2001 | B | conf |
WADS
|
| 2001 | C | conf |
NSPW
|
| 2001 | J | jnl |
Adv. Comput.
|
| 2000 | A* | conf |
PODS
|
| 2000 | — | conf |
Recent Advances in Intrusion Detection
|
| 2000 | — | ch. |
Handbook of Computational Geometry
|
| 2000 | C | conf |
Natural language processing for information assurance and security: an overview and implementations.
NSPW
|
| 2000 | J | jnl |
Algorithmica
|
| 1999 | — | book |
|
| 1999 | J | jnl |
Int. J. Comput. Geom. Appl.
|
| 1999 | J | jnl |
Parallel Process. Lett.
|
| 1999 | J | jnl |
IEEE Trans. Pattern Anal. Mach. Intell.
|
| 1999 | — | conf |
Security and Watermarking of Multimedia Contents
|
| 1998 | J | jnl |
IEEE Trans. Computers
|
| 1998 | Misc | conf |
COCOON
|
| 1997 | B | conf |
ISAAC
|
| 1997 | — | conf |
CCCG
|
| 1997 | — | ch. |
Pattern Matching Algorithms
|
| 1996 | — | conf |
ICIP (2)
|
| 1996 | B | conf |
ISAAC
|
| 1996 | C | conf |
WETICE
|
| 1996 | B | conf |
Data Compression Conference
|
| 1995 | J | jnl |
Algorithmica
|
| 1995 | J | jnl |
Int. J. Comput. Geom. Appl.
|
| 1995 | J | jnl |
Comput. Geom.
|
| 1995 | J | jnl |
IEEE Trans. Computers
|
| 1995 | — | conf |
IPPS
|
| 1994 | J | jnl |
J. Parallel Distributed Comput.
|
| 1994 | A | conf |
GD
|
| 1994 | — | conf |
SCG
|
| 1994 | J | jnl |
J. Parallel Distributed Comput.
|
| 1994 | — | conf |
PARLE
|
| 1994 | J | jnl |
J. ACM
|
| 1993 | J | jnl |
Algorithmica
|
| 1993 | J | jnl |
Random Struct. Algorithms
|
| 1993 | A | conf |
ESA
|
| 1993 | B | conf |
WADS
|
| 1993 | J | jnl |
Discret. Appl. Math.
|
| 1993 | J | jnl |
Comput. Geom.
|
| 1993 | — | conf |
CCCG
|
| 1993 | — | conf |
SPDP
|
| 1993 | J | jnl |
Inf. Comput.
|
| 1993 | J | jnl |
Int. J. Comput. Geom. Appl.
|
| 1992 | J | jnl |
J. Algorithms
|
| 1992 | J | jnl |
Algorithmica
|
| 1992 | J | jnl |
Discret. Appl. Math.
|
| 1992 | J | jnl |
J. Parallel Distributed Comput.
|
| 1992 | J | jnl |
Discret. Appl. Math.
|
| 1992 | J | jnl |
Algorithmica
|
| 1992 | J | jnl |
Proc. IEEE
|
| 1992 | B | conf |
CPM
|
| 1991 | A* | conf |
SODA
|
| 1991 | J | jnl |
J. ACM
|
| 1991 | A | conf |
ICDCS
|
| 1991 | J | jnl |
Pattern Recognit.
|
| 1991 | B | conf |
SPAA
|
| 1991 | J | jnl |
Comput. Geom.
|
| 1991 | J | jnl |
Concurr. Pract. Exp.
|
| 1991 | J | jnl |
Algorithmica
|
| 1990 | — | conf |
SWAT
|
| 1990 | A* | conf |
ICALP
|
| 1990 | J | jnl |
SIAM J. Comput.
|
| 1990 | J | jnl |
J. Parallel Distributed Comput.
|
| 1990 | B | conf |
SPAA
|
| 1990 | B | conf |
SPAA
|
| 1989 | J | jnl |
Algorithmica
|
| 1989 | J | jnl |
Inf. Process. Lett.
|
| 1989 | J | jnl |
SIAM J. Comput.
|
| 1989 | B | conf |
SPAA
|
| 1989 | — | conf |
SCG
|
| 1989 | B | conf |
WADS
|
| 1989 | — | conf |
SCG
|
| 1988 | J | jnl |
SIAM J. Comput.
|
| 1988 | J | jnl |
Discret. Appl. Math.
|
| 1988 | J | jnl |
IEEE Trans. Computers
|
| 1988 | J | jnl |
J. ACM
|
| 1988 | — | conf |
AWOC
|
| 1988 | J | jnl |
Algorithmica
|
| 1988 | J | jnl |
Inf. Process. Lett.
|
| 1987 | A* | conf |
FOCS
|
| 1987 | J | jnl |
Inf. Process. Lett.
|
| 1987 | J | jnl |
J. Algorithms
|
| 1986 | J | jnl |
Discret. Appl. Math.
|
| 1986 | J | jnl |
Discret. Appl. Math.
|
| 1986 | J | jnl |
J. Algorithms
|
| 1986 | J | jnl |
J. Parallel Distributed Comput.
|
| 1986 | — | conf |
SCG
|
| 1986 | J | jnl |
IEEE Trans. Computers
|
| 1986 | A* | conf |
STOC
|
| 1986 | J | jnl |
Inf. Control.
|
| 1985 | J | jnl |
IEEE Trans. Computers
|
| 1985 | J | jnl |
J. Comput. Syst. Sci.
|
| 1985 | B | conf |
ICPP
|
| 1985 | J | jnl |
IEEE Trans. Computers
|
| 1985 | A* | conf |
FOCS
|
| 1984 | J | jnl |
Int. J. Parallel Program.
|
| 1984 | J | jnl |
J. Comput. Syst. Sci.
|
| 1984 | J | jnl |
J. ACM
|
| 1984 | J | jnl |
Inf. Process. Lett.
|
| 1983 | J | jnl |
Inf. Process. Lett.
|
| 1983 | A* | conf |
FOCS
|
| 1982 | J | jnl |
SIAM J. Comput.
|
| 1982 | A* | conf |
STOC
|
| 1981 | J | jnl |
Inf. Process. Lett.
|