| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | — | conf |
CODASPY
|
| 2025 | — | conf |
ESORICS (4)
|
| 2025 | A | conf |
AsiaCCS
|
| 2025 | J | jnl |
Discret. Appl. Math.
|
| 2025 | A | conf |
AsiaCCS
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | — | conf |
DGMM
|
| 2025 | A* | conf |
USENIX Security Symposium
|
| 2024 | A* | conf |
NDSS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
ISC (1)
|
| 2024 | — | conf |
CANS (1)
|
| 2024 | J | jnl |
New Gener. Comput.
|
| 2024 | C | conf |
SECRYPT
|
| 2024 | Misc | conf |
FUN
|
| 2024 | C | conf |
SSS
|
| 2024 | — | conf |
ESORICS (3)
|
| 2024 | — | conf |
FPS (1)
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | A | conf |
AsiaCCS
|
| 2024 | — | conf |
AFRICACRYPT
|
| 2023 | — | ch. |
Handb. Formal Anal. Verification Cryptogr.
|
| 2023 | Misc | conf |
IWSEC
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
ACM J. Exp. Algorithmics
|
| 2023 | C | conf |
SECRYPT
|
| 2023 | Misc | conf |
SAC
|
| 2023 | — | conf |
BRAINS
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality.
Theor. Comput. Sci.
|
| 2023 | J | jnl |
Theor. Comput. Sci.
|
| 2023 | J | jnl |
Theor. Comput. Sci.
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2023 | — | conf |
FC (1)
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | Misc | conf |
SAC
|
| 2023 | A* | conf |
IJCAI
|
| 2023 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2023 | J | jnl |
J. Comput. Secur.
|
| 2023 | J | jnl |
CoRR
|
| 2022 | B | conf |
ACNS
|
| 2022 | — | conf |
FPS
|
| 2022 | C | conf |
SECRYPT
|
| 2022 | — | conf |
NordSec
|
| 2022 | Misc | conf |
FUN
|
| 2022 | C | conf |
SSS
|
| 2022 | J | jnl |
New Gener. Comput.
|
| 2022 | C | conf |
TAMC
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | — | conf |
Public Key Cryptography (1)
|
| 2022 | A* | conf |
SoCG
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | Misc | conf |
SAC
|
| 2022 | C | conf |
SECRYPT
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
J. Comput. Secur.
|
| 2022 | C | conf |
SSS
|
| 2022 | J | jnl |
Inf. Comput.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | Misc | conf |
INDOCRYPT
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
J. Artif. Intell. Res.
|
| 2022 | A* | conf |
ICDE
|
| 2022 | J | jnl |
ACM J. Exp. Algorithmics
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | A | conf |
CP
|
| 2021 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2021 | Misc | conf |
FUN
|
| 2021 | J | jnl |
Concurr. Comput. Pract. Exp.
|
| 2021 | C | conf |
SECRYPT
|
| 2021 | Misc | conf |
FUN
|
| 2021 | — | ch. |
Security of Ubiquitous Computing Systems
|
| 2021 | — | conf |
FPS
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | — | conf |
Financial Cryptography (1)
|
| 2021 | J | jnl |
Theor. Comput. Sci.
|
| 2021 | J | jnl |
Inf. Sci.
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | C | conf |
CiE
|
| 2021 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | A | conf |
CSF
|
| 2021 | Misc | conf |
Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Opaque Robots with Common Chirality.
ICDCN
|
| 2021 | — | conf |
NETYS
|
| 2021 | A* | conf |
SoCG
|
| 2021 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Theor. Comput. Sci.
|
| 2020 | B | conf |
ARES
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
Inf. Process. Lett.
|
| 2020 | J | jnl |
Artif. Intell.
|
| 2020 | — | conf |
ISWC (Demos/Industry)
|
| 2020 | — | conf |
FPS
|
| 2020 | B | conf |
DBSec
|
| 2020 | B | conf |
WISE
|
| 2020 | — | conf |
NETYS
|
| 2020 | — | conf |
ICETE (2)
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | C | conf |
SSS
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | — | conf |
Tokenomics
|
| 2020 | C | conf |
ProvSec
|
| 2020 | B | conf |
TrustCom
|
| 2019 | C | conf |
ISPEC
|
| 2019 | C | conf |
ICTAC
|
| 2019 | — | conf |
ICETE (2)
|
| 2019 | — | conf |
Public Key Cryptography (1)
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | J | jnl |
Comput. Secur.
|
| 2019 | — | conf |
FPS
|
| 2019 | B | conf |
SIROCCO
|
| 2019 | J | jnl |
CoRR
|
| 2019 | Misc | conf |
COCOON
|
| 2019 | — | conf |
World Conference on Information Security Education
|
| 2019 | C | conf |
ISPEC
|
| 2019 | — | conf |
ICETE (2)
|
| 2019 | Misc | conf |
IWSEC
|
| 2019 | — | conf |
ICETE (2)
|
| 2019 | — | conf |
Financial Cryptography
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | — | conf |
ICETE (Selected Papers)
|
| 2019 | — | conf |
FPS
|
| 2019 | — | conf |
FPS
|
| 2019 | C | conf |
WISTP
|
| 2018 | Misc | conf |
FUN
|
| 2018 | C | conf |
SSS
|
| 2018 | J | jnl |
Inf. Process. Lett.
|
| 2018 | — | conf |
ICETE (2)
|
| 2018 | — | conf |
FPS
|
| 2018 | B | conf |
RCIS
|
| 2018 | — | conf |
EMCIS
|
| 2017 | A | conf |
AsiaCCS
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
IACR Trans. Symmetric Cryptol.
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | — | conf |
WISEC
|
| 2017 | J | jnl |
Comput. Secur.
|
| 2017 | C | conf |
MobiQuitous
|
| 2017 | — | conf |
FPS
|
| 2017 | C | conf |
SECRYPT
|
| 2017 | J | jnl |
Formal Methods Syst. Des.
|
| 2017 | C | conf |
SECRYPT
|
| 2017 | J | jnl |
EAI Endorsed Trans. Mob. Commun. Appl.
|
| 2017 | J | jnl |
Cryptologia
|
| 2017 | C | conf |
SECRYPT
|
| 2017 | — | conf |
ICETE (Selected Papers)
|
| 2017 | — | conf |
ICETE (Selected Papers)
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | C | conf |
SECRYPT
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
Wirel. Networks
|
| 2017 | B | conf |
ARES
|
| 2017 | B | conf |
CANS
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | C | conf |
ProvSec
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | Misc | conf |
SEC
|
| 2016 | — | conf |
WISEC
|
| 2016 | — | conf |
FPS
|
| 2016 | J | jnl |
J. Autom. Reason.
|
| 2016 | B | conf |
SAFECOMP
|
| 2016 | J | jnl |
Distributed Comput.
|
| 2016 | J | jnl |
EAI Endorsed Trans. Mob. Commun. Appl.
|
| 2016 | J | jnl |
Theor. Comput. Sci.
|
| 2016 | Misc | conf |
FUN
|
| 2016 | J | jnl |
CoRR
|
| 2016 | C | conf |
SECRYPT
|
| 2016 | J | jnl |
CoRR
|
| 2016 | Misc | conf |
INDOCRYPT
|
| 2016 | C | conf |
SECRYPT
|
| 2016 | B | conf |
ARES
|
| 2015 | C | conf |
ISPEC
|
| 2015 | — | conf |
ICETE (Selected Papers)
|
| 2015 | J | jnl |
J. Comput. Secur.
|
| 2015 | C | conf |
SECRYPT
|
| 2015 | J | jnl |
J. Sens. Actuator Networks
|
| 2015 | B | conf |
RV
|
| 2015 | — | conf |
FPS
|
| 2015 | — | conf |
ADHOCNETS
|
| 2015 | — | conf |
FPS
|
| 2014 | — | conf |
FPS
|
| 2014 | J | jnl |
Discret. Appl. Math.
|
| 2014 | J | jnl |
J. Sens. Actuator Networks
|
| 2014 | C | conf |
SECRYPT
|
| 2014 | — | conf |
ICETE (Selected Papers)
|
| 2014 | — | conf |
FPS
|
| 2014 | — | conf |
ADHOC-NOW
|
| 2014 | B | conf |
LCN
|
| 2014 | Misc | conf |
FUN
|
| 2014 | — | conf |
CSS
|
| 2014 | B | conf |
LCN
|
| 2013 | — | conf |
FPS
|
| 2013 | A | conf |
ESORICS
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
AFRICACRYPT
|
| 2013 | A | conf |
AsiaCCS
|
| 2013 | — | conf |
FPS
|
| 2013 | — | conf |
POST
|
| 2013 | B | conf |
FoSSaCS
|
| 2013 | B | conf |
DCOSS
|
| 2012 | — | conf |
ICC
|
| 2012 | B | conf |
SIROCCO
|
| 2012 | J | jnl |
CoRR
|
| 2012 | — | book |
|
| 2012 | A | conf |
ESORICS
|
| 2012 | — | ed. |
FPS
|
| 2011 | J | jnl |
J. Autom. Reason.
|
| 2011 | — | conf |
FPS
|
| 2011 | — | conf |
AFRICACRYPT
|
| 2011 | — | conf |
FPS
|
| 2010 | — | conf |
Concurrency, Compositionality, and Correctness
|
| 2010 | J | jnl |
CoRR
|
| 2010 | J | jnl |
CoRR
|
| 2010 | — | conf |
IIH-MSP
|
| 2009 | — | conf |
ASIAN
|
| 2009 | — | conf |
Formal to Practical Security
|
| 2009 | — | conf |
Formal Aspects in Security and Trust
|
| 2008 | J | jnl |
IEEE Commun. Mag.
|
| 2008 | J | jnl |
Inf. Comput.
|
| 2008 | A* | conf |
CCS
|
| 2007 | J | jnl |
Ann. UMCS Informatica
|
| 2007 | J | jnl |
Inf. Comput.
|
| 2006 | J | jnl |
J. Comput. Secur.
|
| 2006 | — | conf |
SecReT@ICALP
|
| 2006 | — | conf |
ICALP (2)
|
| 2006 | — | — |
|
| 2005 | — | conf |
RTA
|