| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2022 | C | conf |
CRITIS
|
| 2021 | — | conf |
EISA
|
| 2021 | C | conf |
SIN
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Frontiers Big Data
|
| 2020 | — | conf |
FNC/MobiSPC
|
| 2019 | B | ed. |
DBSec
|
| 2019 | — | conf |
NTMS
|
| 2019 | — | conf |
Security Protocols Workshop
|
| 2019 | — | conf |
Security Protocols Workshop
|
| 2018 | J | jnl |
Inf. Comput. Secur.
|
| 2018 | C | conf |
NSPW
|
| 2018 | B | conf |
DBSec
|
| 2018 | J | jnl |
J. Comput. Secur.
|
| 2018 | — | conf |
CPS-SPC@CCS
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | conf |
IEEE BigData
|
| 2018 | — | conf |
CSS
|
| 2018 | — | conf |
NordSec
|
| 2017 | C | conf |
CRiSIS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | — | ed. |
ESORICS (1)
|
| 2017 | — | ed. |
ESORICS (2)
|
| 2017 | C | conf |
NSPW
|
| 2017 | — | conf |
Security Protocols Workshop
|
| 2017 | — | conf |
Security Protocols Workshop
|
| 2017 | — | conf |
ICCNS
|
| 2017 | — | conf |
CyberICPS/SECPRE@ESORICS
|
| 2016 | C | conf |
CRiSIS
|
| 2016 | B | conf |
DBSec
|
| 2016 | B | conf |
DBSec
|
| 2016 | — | conf |
Security Protocols Workshop
|
| 2016 | — | conf |
Security Protocols Workshop
|
| 2015 | — | conf |
CNS
|
| 2015 | — | conf |
Security Protocols Workshop
|
| 2015 | — | conf |
Security Protocols Workshop
|
| 2014 | — | conf |
Security Protocols Workshop
|
| 2014 | — | conf |
Security Protocols Workshop
|
| 2014 | — | ed. |
DPM/SETOP
|
| 2014 | C | conf |
NSPW
|
| 2013 | J | jnl |
Int. J. Intell. Syst.
|
| 2013 | — | conf |
CNS
|
| 2013 | — | conf |
CNS
|
| 2013 | B | conf |
ICTAI
|
| 2013 | J | jnl |
J. Inf. Secur. Appl.
|
| 2013 | — | conf |
IFIPTM
|
| 2012 | C | ed. |
CRiSIS
|
| 2012 | C | conf |
CRiSIS
|
| 2012 | — | conf |
DPM/SETOP
|
| 2012 | B | conf |
DBSec
|
| 2012 | J | jnl |
J. Comput. Secur.
|
| 2012 | C | conf |
CRiSIS
|
| 2011 | C | conf |
CRiSIS
|
| 2011 | J | jnl |
Comput. Stand. Interfaces
|
| 2011 | — | conf |
Formal Aspects in Security and Trust
|
| 2011 | C | ed. |
CRiSIS
|
| 2011 | — | conf |
SafeConfig
|
| 2011 | — | conf |
Integrated Network Management
|
| 2011 | J | jnl |
Inf. Sci.
|
| 2011 | J | jnl |
J. Comput. Secur.
|
| 2011 | — | conf |
SafeConfig
|
| 2011 | — | conf |
Integrated Network Management
|
| 2010 | J | jnl |
IBM J. Res. Dev.
|
| 2010 | B | conf |
CNSM
|
| 2010 | — | conf |
STM
|
| 2010 | — | conf |
SafeConfig
|
| 2010 | J | jnl |
IEEE Commun. Mag.
|
| 2010 | J | jnl |
Secur. Commun. Networks
|
| 2010 | B | conf |
AVI
|
| 2009 | B | conf |
DBSec
|
| 2009 | J | jnl |
J. Comput. Secur.
|
| 2009 | — | conf |
Security Protocols Workshop
|
| 2009 | — | conf |
Security Protocols Workshop
|
| 2008 | — | conf |
CSCLP
|
| 2008 | — | conf |
WOSIS
|
| 2008 | — | conf |
Security Protocols Workshop
|
| 2008 | — | conf |
ICDE Workshops
|
| 2006 | — | conf |
CSFW
|
| 2006 | — | ch. |
Quality of Protection
|
| 2006 | — | conf |
IPOM
|
| 2006 | J | jnl |
J. High Speed Networks
|
| 2006 | J | jnl |
J. High Speed Networks
|
| 2006 | J | jnl |
Int. J. High Perform. Comput. Appl.
|
| 2005 | — | conf |
Formal Aspects in Security and Trust
|
| 2005 | J | jnl |
J. Comput. Secur.
|
| 2005 | — | conf |
INTELLCOMM
|
| 2005 | — | conf |
Security Protocols Workshop
|
| 2005 | — | conf |
Security Protocols Workshop
|
| 2005 | J | jnl |
Sci. Program.
|
| 2005 | Misc | conf |
PDPTA
|
| 2005 | A | conf |
ACSAC
|
| 2005 | C | ed. |
NSPW
|
| 2005 | — | conf |
STM
|
| 2005 | B | conf |
DBSec
|
| 2004 | A | conf |
IPDPS
|
| 2004 | C | conf |
NSPW
|
| 2004 | — | conf |
ARSPA@IJCAR
|
| 2004 | B | conf |
DBSec
|
| 2004 | A* | conf |
AAAI
|
| 2004 | — | conf |
ISPDC/HeteroPar
|
| 2004 | Misc | conf |
SAC
|
| 2004 | — | conf |
Formal Aspects in Security and Trust
|
| 2004 | — | conf |
SWS
|
| 2004 | — | conf |
VODCA@FOSAD
|
| 2004 | A | conf |
ACSAC
|
| 2003 | B | conf |
SAFECOMP
|
| 2003 | J | jnl |
IEEE J. Sel. Areas Commun.
|
| 2003 | — | conf |
POLICY
|
| 2003 | — | conf |
FMSE
|
| 2003 | — | conf |
Security Protocols Workshop
|
| 2003 | — | conf |
Security Protocols Workshop
|
| 2003 | — | conf |
Financial Cryptography
|
| 2002 | C | ed. |
NSPW
|
| 2002 | Misc | conf |
SEC
|
| 2002 | — | conf |
Security Protocols Workshop
|
| 2001 | J | jnl |
Commun. ACM
|
| 2001 | C | conf |
NSPW
|
| 2001 | — | conf |
Security Protocols Workshop
|
| 2001 | — | conf |
Security Protocols Workshop
|
| 2000 | C | conf |
NSPW
|
| 1998 | A | conf |
ESORICS
|
| 1998 | C | conf |
Workshop on New Security Paradigms
|
| 1998 | — | conf |
Security Protocols Workshop
|
| 1998 | — | conf |
Security Protocols Workshop
|
| 1997 | J | jnl |
Comput. Secur.
|
| 1997 | A | conf |
ACSAC
|
| 1997 | A* | conf |
CCS
|
| 1996 | — | conf |
S&P
|
| 1995 | J | jnl |
J. Comput. Secur.
|
| 1995 | — | conf |
CSFW
|
| 1994 | — | conf |
CSFW
|
| 1992 | J | jnl |
J. Comput. Secur.
|
| 1991 | — | conf |
S&P
|
| 1991 | — | conf |
CSFW
|
| 1990 | — | conf |
CSFW
|
| 1989 | — | conf |
S&P
|
| 1987 | — | conf |
S&P
|