| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2020 | J | jnl |
ACM Trans. Priv. Secur.
|
| 2018 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2018 | J | jnl |
CoRR
|
| 2017 | — | conf |
ESORICS (2)
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | — | — |
|
| 2015 | — | conf |
TRUST
|
| 2014 | J | jnl |
Proc. IEEE
|
| 2014 | — | ch. |
Secure Smart Embedded Devices, Platforms and Applications
|
| 2014 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2014 | A | conf |
EuroSys
|
| 2014 | A | conf |
DSN
|
| 2013 | A* | conf |
CCS
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | — | conf |
ISSE
|
| 2012 | J | jnl |
Datenschutz und Datensicherheit
|
| 2012 | — | conf |
Financial Cryptography
|
| 2012 | — | conf |
WISEC
|
| 2012 | A | conf |
ESORICS
|
| 2011 | A* | conf |
CCS
|
| 2011 | — | conf |
STC@CCS
|
| 2011 | — | conf |
WISEC
|
| 2010 | — | conf |
Financial Cryptography Workshops
|
| 2010 | — | conf |
Information Hiding
|
| 2009 | A | conf |
ESORICS
|
| 2009 | — | conf |
TRUST
|
| 2009 | — | conf |
INTRUST
|