| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | A* | conf |
"Technically speaking I'm at the top of the hierarchy": How System Administrators Think About Power.
CHI
|
| 2026 | — | conf |
DFDS
|
| 2026 | A* | conf |
CHI
|
| 2026 | — | conf |
CHI Extended Abstracts
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A* | conf |
CHI
|
| 2025 | J | jnl |
Dagstuhl Reports
|
| 2025 | J | jnl |
IEEE Secur. Priv.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
DFDS
|
| 2025 | J | jnl |
J. Cybersecur.
|
| 2024 | A* | conf |
CCS
|
| 2024 | — | conf |
EuroUSEC
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
DTRAP
|
| 2024 | A* | conf |
SP
|
| 2024 | — | conf |
EuroUSEC
|
| 2023 | — | conf |
CHI Extended Abstracts
|
| 2023 | — | conf |
CHI Extended Abstracts
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
CHI Extended Abstracts
|
| 2022 | J | jnl |
Digit. Investig.
|
| 2022 | Misc | conf |
SEC
|
| 2020 | J | jnl |
Netw. Secur.
|
| 2020 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2020 | A* | conf |
SP
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
Inform. Spektrum
|
| 2019 | J | jnl |
Dagstuhl Reports
|
| 2019 | J | jnl |
J. Comput. Secur.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | A* | conf |
CHI
|
| 2019 | J | jnl |
CoRR
|
| 2019 | — | conf |
MLMI
|
| 2018 | B | conf |
TrustBus
|
| 2018 | J | jnl |
CoRR
|
| 2018 | A | conf |
RAID
|
| 2018 | — | conf |
WISEC
|
| 2018 | — | conf |
SOUPS @ USENIX Security Symposium
|
| 2018 | — | conf |
CyberICPS/SECPRE@ESORICS
|
| 2017 | — | conf |
MuC (Workshopband)
|
| 2017 | — | conf |
WISEC
|
| 2017 | — | conf |
ESORICS (2)
|
| 2017 | — | conf |
Financial Cryptography Workshops
|
| 2016 | J | jnl |
CoRR
|
| 2016 | A* | conf |
CHI
|
| 2016 | — | conf |
Sicherheit
|
| 2016 | — | ed. |
STAST
|
| 2015 | — | ch. |
Attribute-based Credentials for Trust
|
| 2015 | C | conf |
NSPW
|
| 2015 | — | conf |
APF
|
| 2015 | — | conf |
WEIS
|
| 2014 | B | conf |
TrustBus
|
| 2014 | — | conf |
Sicherheit
|
| 2014 | — | conf |
DEXA Workshops
|
| 2014 | — | conf |
PerCom Workshops
|
| 2014 | — | conf |
HCI (24)
|
| 2013 | — | conf |
CHI Extended Abstracts
|
| 2012 | — | conf |
Sicherheit
|
| 2012 | C | conf |
FedCSIS
|
| 2011 | — | conf |
SysSec@DIMVA
|
| 2010 | J | jnl |
it Inf. Technol.
|
| 2010 | J | jnl |
Ad Hoc Sens. Wirel. Networks
|
| 2009 | B | conf |
EWSN
|
| 2008 | — | — |
|
| 2008 | — | conf |
ADHOC-NOW
|
| 2007 | B | conf |
MDM
|
| 2007 | — | conf |
Algorithms for Sensor and Ad Hoc Networks
|
| 2007 | — | conf |
COMSWARE
|
| 2006 | — | conf |
PerCom Workshops
|
| 2006 | Misc | conf |
SEC
|
| 2006 | B | conf |
MASS
|
| 2006 | — | conf |
ARCS Workshops
|
| 2006 | — | conf |
Sicherheit
|
| 2006 | — | conf |
SPC
|
| 2006 | A | conf |
ESORICS
|
| 2006 | — | conf |
ESAS
|
| 2005 | B | conf |
EWSN
|
| 2005 | — | conf |
Dependability Metrics
|
| 2005 | — | conf |
Sicherheit
|
| 2005 | — | conf |
IASTED PDCS
|
| 2004 | — | conf |
GI Jahrestagung (2)
|