| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2015 | J | jnl |
Des. Codes Cryptogr.
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2008 | — | conf |
EuroPKI
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2005 | — | ch. |
Encyclopedia of Cryptography and Security
|
| 2000 | — | conf |
Security Protocols Workshop
|
| 2000 | J | jnl |
Future Gener. Comput. Syst.
|
| 1999 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 1998 | — | conf |
Security Protocols Workshop
|
| 1998 | — | conf |
Security Protocols Workshop
|
| 1998 | — | conf |
Security Protocols Workshop
|
| 1998 | — | conf |
Lectures on Data Security
|
| 1998 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 1998 | J | jnl |
J. Cryptol.
|
| 1997 | — | ch. |
Personal Medical Information
|
| 1997 | — | conf |
State of the Art in Applied Cryptography
|
| 1996 | J | jnl |
Inf. Secur. Tech. Rep.
|
| 1993 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 1992 | J | jnl |
Des. Codes Cryptogr.
|
| 1992 | A* | conf |
EUROCRYPT
|
| 1991 | A* | conf |
EUROCRYPT
|
| 1991 | A | conf |
ASIACRYPT
|
| 1990 | A* | conf |
EUROCRYPT
|
| 1990 | J | jnl |
J. Comb. Theory A
|
| 1989 | A* | conf |
EUROCRYPT
|
| 1988 | A* | conf |
EUROCRYPT
|
| 1988 | A* | conf |
CRYPTO
|