| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2013 | J | jnl |
Comput. Law Secur. Rev.
|
| 2012 | J | jnl |
Comput. Law Secur. Rev.
|
| 2010 | — | ch. |
Data Protection in a Profiled World
|
| 2007 | J | jnl |
Comput. Law Secur. Rev.
|
| 2006 | J | jnl |
Comput. Law Secur. Rev.
|
| 2006 | J | jnl |
Comput. Law Secur. Rev.
|
| 2006 | J | jnl |
Comput. Law Secur. Rev.
|
| 2006 | J | jnl |
Comput. Law Secur. Rev.
|
| 2006 | J | jnl |
Comput. Law Secur. Rev.
|
| 2005 | J | jnl |
Comput. Law Secur. Rev.
|
| 2005 | B | conf |
TrustBus
|
| 2005 | J | jnl |
Comput. Law Secur. Rev.
|
| 2004 | — | conf |
ICEB
|