| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Frontiers Comput. Sci.
|
| 2026 | J | jnl |
Expert Syst. Appl.
|
| 2026 | J | jnl |
IEEE Commun. Surv. Tutorials
|
| 2025 | J | jnl |
Digit. Commun. Networks
|
| 2025 | B | conf |
TrustCom
|
| 2025 | J | jnl |
Cybersecur.
|
| 2025 | J | jnl |
Peer Peer Netw. Appl.
|
| 2025 | J | jnl |
Cybersecur.
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | A* | conf |
CCS
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2025 | J | jnl |
IEEE Trans. Instrum. Meas.
|
| 2024 | J | jnl |
Comput. J.
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2024 | — | conf |
ACISP (3)
|
| 2023 | J | jnl |
IET Inf. Secur.
|
| 2023 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2023 | J | jnl |
IEEE Internet Things J.
|
| 2022 | J | jnl |
Comput. Sci. Rev.
|
| 2022 | J | jnl |
Comput. Secur.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | J | jnl |
Patterns
|
| 2021 | — | conf |
ICICS (2)
|
| 2021 | J | jnl |
CoRR
|
| 2021 | Misc | conf |
ACISP
|
| 2021 | Misc | conf |
UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module.
Inscrypt
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
IEEE Access
|
| 2020 | J | jnl |
Comput. Secur.
|
| 2020 | J | jnl |
Future Gener. Comput. Syst.
|
| 2020 | J | jnl |
Int. J. Inf. Sec.
|
| 2020 | J | jnl |
IET Inf. Secur.
|
| 2020 | J | jnl |
Secur. Commun. Networks
|
| 2019 | Misc | conf |
ACISP
|
| 2019 | Misc | conf |
ACISP
|
| 2018 | C | conf |
ISC
|
| 2018 | J | jnl |
IEEE Access
|
| 2018 | Misc | conf |
ACISP
|
| 2017 | — | conf |
CSS
|
| 2016 | C | conf |
ISPEC
|
| 2016 | J | jnl |
Secur. Commun. Networks
|
| 2016 | — | conf |
ASIACRYPT (2)
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
J. Comput. Secur.
|
| 2016 | J | jnl |
Int. J. Inf. Sec.
|
| 2015 | C | conf |
ProvSec
|
| 2015 | J | jnl |
Theor. Comput. Sci.
|
| 2014 | B | conf |
ACNS
|
| 2014 | — | conf |
ASIACRYPT (2)
|
| 2014 | J | jnl |
Comput. J.
|
| 2014 | J | jnl |
Inf. Sci.
|
| 2014 | Misc | conf |
SCN
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | Misc | conf |
ACISP
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | C | conf |
ProvSec
|
| 2012 | J | jnl |
Secur. Commun. Networks
|
| 2012 | J | jnl |
Inf. Process. Lett.
|
| 2012 | B | conf |
ACNS
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | Misc | conf |
ICISC
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
Inf. Process. Lett.
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | — | conf |
Public Key Cryptography
|
| 2009 | C | conf |
TAMC
|
| 2009 | A | conf |
ASIACRYPT
|