| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | C | conf |
WoWMoM
|
| 2025 | — | conf |
ARES (1)
|
| 2025 | — | conf |
ECML/PKDD (2)
|
| 2025 | A | conf |
EuroS&P
|
| 2024 | J | jnl |
CoRR
|
| 2024 | B | conf |
SRDS
|
| 2024 | A* | conf |
CCS
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
WPES@CCS
|
| 2023 | — | conf |
PerCom Workshops
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A | conf |
FC
|
| 2023 | A | conf |
FC
|
| 2023 | A | conf |
DSN
|
| 2023 | B | conf |
ICPADS
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A | conf |
FC
|
| 2023 | A* | conf |
ICML
|
| 2023 | — | conf |
PAKDD (2)
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol.
|
| 2022 | B | conf |
AFT
|
| 2022 | J | jnl |
CoRR
|
| 2022 | Misc | conf |
ICDCN
|
| 2021 | — | conf |
DAPPS
|
| 2021 | B | conf |
ARES
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | — | conf |
DAPPS
|
| 2021 | J | jnl |
CoRR
|
| 2020 | — | conf |
TPS-ISA
|
| 2020 | J | jnl |
CoRR
|
| 2020 | Misc | conf |
ICDCN
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
Financial Cryptography
|
| 2020 | B | conf |
SRDS
|
| 2020 | — | conf |
Financial Cryptography
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
CoRR
|
| 2019 | B | conf |
SRDS
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
On the Limits of Byzantine-tolerant Spanning Tree Construction in Route-Restricted Overlay Networks.
CoRR
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | — | conf |
TrustCom/BigDataSE
|
| 2018 | C | conf |
WOWMOM
|
| 2018 | A* | conf |
NDSS
|
| 2017 | A* | conf |
INFOCOM
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2016 | — | ch. |
Ausgezeichnete Informatikdissertationen
|
| 2016 | — | — |
|
| 2016 | A* | conf |
INFOCOM
|
| 2016 | J | jnl |
ACM Trans. Model. Perform. Evaluation Comput. Syst.
|
| 2016 | C | conf |
WoWMoM
|
| 2016 | J | jnl |
CoRR
|
| 2015 | — | conf |
NetSys
|
| 2015 | — | conf |
NetSys
|
| 2015 | A* | conf |
INFOCOM
|
| 2015 | B | conf |
LCN
|
| 2015 | A | conf |
ICDCS
|
| 2014 | J | jnl |
CoRR
|
| 2014 | — | conf |
ICC
|
| 2014 | C | conf |
ISCC
|
| 2014 | — | conf |
SpringSim (CNS)
|
| 2014 | — | conf |
P2P
|
| 2014 | — | conf |
MobiArch
|
| 2014 | A | conf |
Privacy Enhancing Technologies
|
| 2014 | — | conf |
CNS
|
| 2014 | J | jnl |
CoRR
|
| 2013 | A* | conf |
INFOCOM
|
| 2013 | J | jnl |
CoRR
|
| 2013 | — | conf |
NetSys
|
| 2013 | J | jnl |
CoRR
|
| 2012 | — | conf |
ICDCS Workshops
|
| 2012 | B | conf |
COLING
|
| 2011 | — | conf |
SRDS Workshops
|
| 2010 | J | jnl |
Int. J. Comput. Model. Algorithms Medicine
|
| 2010 | — | conf |
KES (4)
|