| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2015 | J | jnl |
CoRR
|
| 2014 | A* | conf |
USENIX Security Symposium
|
| 2014 | J | jnl |
CoRR
|
| 2013 | A* | conf |
NDSS
|
| 2013 | — | conf |
Financial Cryptography
|
| 2013 | A* | conf |
CCS
|
| 2012 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2012 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2012 | A* | conf |
NDSS
|
| 2012 | A* | conf |
USENIX Security Symposium
|
| 2011 | A | conf |
ACSAC
|
| 2011 | J | jnl |
CoRR
|
| 2011 | A* | conf |
CCS
|
| 2010 | — | ch. |
Handbook of Financial Cryptography and Security
|
| 2010 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2010 | — | conf |
Financial Cryptography
|
| 2010 | A | conf |
Privacy Enhancing Technologies
|
| 2010 | J | jnl |
Int. J. Inf. Sec.
|
| 2009 | A* | conf |
CCS
|
| 2009 | A | conf |
CSF
|
| 2008 | A | conf |
Privacy Enhancing Technologies
|
| 2008 | A* | ed. |
CCS
|
| 2007 | — | conf |
Financial Cryptography
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | — | ch. |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
|
| 2007 | A | conf |
Privacy Enhancing Technologies
|
| 2007 | — | conf |
WPES
|
| 2007 | A* | ed. |
CCS
|
| 2007 | J | jnl |
Commun. ACM
|
| 2006 | A | conf |
Privacy Enhancing Technologies
|
| 2006 | — | conf |
S&P
|
| 2006 | C | conf |
SecureComm
|
| 2006 | A | conf |
Privacy Enhancing Technologies
|
| 2005 | A | ed. |
ESORICS
|
| 2005 | A | conf |
Privacy Enhancing Technologies
|
| 2005 | B | conf |
WCNC
|
| 2004 | J | jnl |
J. Comput. Secur.
|
| 2004 | A | conf |
Privacy Enhancing Technologies
|
| 2004 | — | ed. |
WPES
|
| 2004 | A | conf |
Privacy Enhancing Technologies
|
| 2004 | A* | conf |
USENIX Security Symposium
|
| 2004 | B | conf |
CT-RSA
|
| 2003 | A | conf |
Privacy Enhancing Technologies
|
| 2003 | — | conf |
Financial Cryptography
|
| 2003 | — | conf |
DISCEX (2)
|
| 2003 | A | ed. |
Privacy Enhancing Technologies
|
| 2003 | — | ed. |
WPES
|
| 2002 | — | conf |
ISSS
|
| 2002 | — | ed. |
Financial Cryptography
|
| 2002 | — | conf |
Information Hiding
|
| 2002 | — | conf |
Financial Cryptography
|
| 2001 | A* | conf |
CCS
|
| 2000 | — | conf |
Financial Cryptography
|
| 2000 | — | conf |
FOSAD
|
| 2000 | — | conf |
Workshop on Design Issues in Anonymity and Unobservability
|
| 1999 | — | conf |
Financial Cryptography
|
| 1999 | — | conf |
World Congress on Formal Methods
|
| 1999 | J | jnl |
Commun. ACM
|
| 1999 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 1998 | — | conf |
Financial Cryptography
|
| 1998 | J | jnl |
Distributed Comput.
|
| 1998 | A* | conf |
CCS
|
| 1998 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 1998 | — | conf |
CSFW
|
| 1998 | — | conf |
CSFW
|
| 1997 | — | conf |
CSFW
|
| 1997 | — | conf |
S&P
|
| 1997 | J | jnl |
J. Comput. Secur.
|
| 1997 | — | conf |
Security Protocols Workshop
|
| 1997 | — | conf |
Financial Cryptography
|
| 1996 | J | jnl |
Des. Codes Cryptogr.
|
| 1996 | J | jnl |
ACM SIGOPS Oper. Syst. Rev.
|
| 1996 | — | conf |
Information Hiding
|
| 1996 | — | conf |
S&P
|
| 1996 | A | conf |
ACSAC
|
| 1996 | — | conf |
CSFW
|
| 1995 | — | conf |
CSFW
|
| 1994 | — | conf |
CSFW
|
| 1994 | B | conf |
TARK
|
| 1994 | A* | conf |
EUROCRYPT
|
| 1994 | — | conf |
S&P
|
| 1993 | A* | conf |
CCS
|
| 1993 | J | jnl |
ACM SIGOPS Oper. Syst. Rev.
|
| 1993 | — | conf |
CSFW
|
| 1992 | — | conf |
S&P
|
| 1992 | J | jnl |
J. Comput. Secur.
|
| 1991 | — | conf |
S&P
|
| 1991 | — | conf |
CSFW
|
| 1990 | — | conf |
CSFW
|