| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2018 | J | jnl |
Comput. Law Secur. Rev.
|
| 2013 | — | book |
European Data Protection
|
| 2012 | — | book |
European Data Protection
|
| 2012 | J | jnl |
Comput. Law Secur. Rev.
|
| 2011 | — | book |
Computers, Privacy and Data Protection
|
| 2011 | — | ch. |
Computers, Privacy and Data Protection
|
| 2011 | J | jnl |
Comput. Law Secur. Rev.
|
| 2010 | — | ch. |
Data Protection in a Profiled World
|
| 2010 | — | book |
Data Protection in a Profiled World
|
| 2009 | J | jnl |
Comput. Law Secur. Rev.
|
| 2008 | J | jnl |
Int. J. Law Inf. Technol.
|
| 2006 | J | jnl |
Comput. Law Secur. Rev.
|
| 2006 | — | conf |
The Information Society
|
| 2006 | — | conf |
The Information Society
|
| 2005 | — | conf |
The Information Society
|
| 2004 | J | jnl |
Comput. Law Secur. Rev.
|
| 2004 | J | jnl |
Comput. Law Secur. Rev.
|
| 2002 | J | jnl |
Comput. Law Secur. Rev.
|
| 2001 | J | jnl |
Comput. Law Secur. Rev.
|
| 2000 | J | jnl |
Comput. Law Secur. Rev.
|
| 1998 | J | jnl |
Telematics Informatics
|
| 1995 | J | jnl |
Comput. Law Secur. Rev.
|
| 1991 | J | jnl |
Comput. Law Secur. Rev.
|
| 1990 | J | jnl |
Comput. Law Secur. Rev.
|
| 1989 | A* | conf |
EUROCRYPT
|