The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ross J. Anderson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ross J. Anderson
    Why Information Security is Hard-An Economic Perspective. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:358-365 [Conf]
  2. Ross J. Anderson
    How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:1-0 [Conf]
  3. Ross J. Anderson, Eli Biham, Lars R. Knudsen
    The Case for Serpent. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:349-354 [Conf]
  4. Ross J. Anderson, Serge Vaudenay
    Minding your p's and q`s. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:26-35 [Conf]
  5. Simon W. Moore, Robert D. Mullins, Paul A. Cunningham, Ross J. Anderson, George S. Taylor
    Improving Smart Card Security Using Self-Timed Circuits. [Citation Graph (0, 0)][DBLP]
    ASYNC, 2002, pp:211-0 [Conf]
  6. Ross J. Anderson, Eli Biham, Lars R. Knudsen
    Serpent and Smartcards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:246-253 [Conf]
  7. Ross J. Anderson
    Why Cryptosystems Fail. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:215-227 [Conf]
  8. Ross J. Anderson
    Protecting Embedded Systems - The Next Ten Years. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:1-2 [Conf]
  9. Sergei P. Skorobogatov, Ross J. Anderson
    Optical Fault Induction Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:2-12 [Conf]
  10. Ross J. Anderson
    Crypto in Europe - Markets, Law and Policy. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:75-89 [Conf]
  11. Ross J. Anderson, Roger M. Needham
    Robustness Principles for Public Key Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:236-247 [Conf]
  12. Ross J. Anderson
    UEPS - A Second Generation Electronic Wallet. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:411-418 [Conf]
  13. George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson
    Sybil-Resistant DHT Routing. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:305-318 [Conf]
  14. Ross J. Anderson
    Liability and Computer Security: Nine Principles. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:231-245 [Conf]
  15. Ross J. Anderson
    On the Security of Digital Tachographs. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:111-125 [Conf]
  16. Ross J. Anderson, Michael Roe
    The GCHQ Protocol and Its Problems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:134-148 [Conf]
  17. Ross J. Anderson
    A Modern Rotor Machine. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:47-50 [Conf]
  18. Ross J. Anderson
    Searching for the Optimum Correlation Attack. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:137-143 [Conf]
  19. Ross J. Anderson
    On Fibonacci Keystream Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:346-352 [Conf]
  20. Ross J. Anderson, Eli Biham
    TIGER: A Fast New Hash Function. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:89-97 [Conf]
  21. Ross J. Anderson, Eli Biham
    Two Practical and Provably Secure Block Ciphers: BEARS and LION. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:113-120 [Conf]
  22. Ross J. Anderson, Charalampos Manifavas
    Chameleon - A New Kind of Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:107-113 [Conf]
  23. Eli Biham, Ross J. Anderson, Lars R. Knudsen
    Serpent: A New Block Cipher Proposal. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:222-238 [Conf]
  24. Fabien A. P. Petitcolas, Ross J. Anderson
    Evaluation of Copyright Marking Systems. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 1, 1999, pp:574-579 [Conf]
  25. Ross J. Anderson, Haowen Chan, Adrian Perrig
    Key Infection: Smart Trust for Smart Dust. [Citation Graph (0, 0)][DBLP]
    ICNP, 2004, pp:206-215 [Conf]
  26. Ross J. Anderson
    Stretching the Limits of Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:39-48 [Conf]
  27. Ross J. Anderson, Roger M. Needham, Adi Shamir
    The Steganographic File System. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:73-82 [Conf]
  28. Ross J. Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg
    The Newton Channel. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:151-156 [Conf]
  29. Markus G. Kuhn, Ross J. Anderson
    Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:124-142 [Conf]
  30. Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn
    Attacks on Copyright Marking Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:218-238 [Conf]
  31. Frank Stajano, Ross J. Anderson
    The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:434-447 [Conf]
  32. Ross J. Anderson
    Cryptography and competition policy: issues with 'trusted computing'. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:3-10 [Conf]
  33. David Samyde, Sergei P. Skorobogatov, Ross J. Anderson, Jean-Jacques Quisquater
    On a New Way to Read Data from Memory. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:65-69 [Conf]
  34. Ross J. Anderson
    Privacy Technology Lessons from Healthcare. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:78-79 [Conf]
  35. Ross J. Anderson
    A Security Policy Model for Clinical Information Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:30-43 [Conf]
  36. Ross J. Anderson
    The Correctness of Crypto Transaction Sets. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:125-127 [Conf]
  37. Ross J. Anderson
    The Correctness of Crypto Transaction Sets (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:128-141 [Conf]
  38. Ross J. Anderson
    What We Can Learn from API Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:288-300 [Conf]
  39. Ross J. Anderson, Markus G. Kuhn
    Low Cost Attacks on Tamper Resistant Devices. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:125-136 [Conf]
  40. Ross J. Anderson, Jong-Hyeon Lee
    Jikzi: A New Framework for Secure Publishing. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:21-47 [Conf]
  41. Ross J. Anderson, Václav Matyás Jr., Fabien A. P. Petitcolas, Iain E. Buchan, Rudolf Hanka
    Secure Books: Protecting the Distribution of Knowledge. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:1-11 [Conf]
  42. Ross J. Anderson, Charalampos Manifavas, Chris Sutherland
    NetCard - A Practical Electronic-Cash System. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:49-57 [Conf]
  43. Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas
    Government Access to Keys - Panel Discussion. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:62-73 [Conf]
  44. Frank Stajano, Ross J. Anderson
    The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:172-194 [Conf]
  45. Ross J. Anderson, Frank Stajano, Jong-Hyeon Lee
    Security policies. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2001, v:55, n:, pp:186-237 [Journal]
  46. Ross J. Anderson
    Free speech online and offline. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:6, pp:120- [Journal]
  47. Ross J. Anderson
    Why Cryptosystems Fail. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1994, v:37, n:11, pp:32-40 [Journal]
  48. Ross J. Anderson, Jong-Hyeon Lee
    Jikzi - a new framework for security policy, trusted publishing and electronic commerce. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1621-1626 [Journal]
  49. Ross J. Anderson
    Free Speech Online and Offline. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:6, pp:28-30 [Journal]
  50. Mike Bond, Ross J. Anderson
    API-Level Attacks on Embedded Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:10, pp:67-75 [Journal]
  51. Ross J. Anderson, Cunsheng Ding, Tor Helleseth, Torleiv Kløve
    How to Build Robust Shared Control Systems. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:15, n:2, pp:111-124 [Journal]
  52. Ross J. Anderson, Bruce Schneier
    Guest Editors' Introduction: Economics of Information Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:12-13 [Journal]
  53. George Danezis, Ross J. Anderson
    The Economics of Resisting Censorship. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:45-50 [Journal]
  54. Jeff Jianxin Yan, Alan F. Blackwell, Ross J. Anderson, Alasdair Grant
    Password Memorability and Security: Empirical Results. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:25-31 [Journal]
  55. Ross J. Anderson
    Whither Cryptography. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1994, v:2, n:5, pp:13-20 [Journal]
  56. Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham
    A New Family of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:4, pp:9-20 [Journal]
  57. Ross J. Anderson, Terry Bollinger, Doug Brown, Enrique Draier, Philip Machanick, Gary McGraw, Nancy R. Mead, Arthur B. Pyster, Howard Schmidt, Timothy J. Shimeall
    Roundtable on Information Security Policy. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  58. Ross J. Anderson, S. Johann Bezuidenhoudt
    On the Reliability of Electronic Payment Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:5, pp:294-301 [Journal]
  59. Simon W. Moore, Ross J. Anderson, Robert D. Mullins, George S. Taylor, Jacques J. A. Fournier
    Balanced self-checking asynchronous logic for smart card applications. [Citation Graph (0, 0)][DBLP]
    Microprocessors and Microsystems, 2003, v:27, n:9, pp:421-430 [Journal]

  60. Security, Functionality and Scale? [Citation Graph (, )][DBLP]


  61. Information Security Economics - and Beyond. [Citation Graph (, )][DBLP]


  62. Optimised to Fail: Card Readers for Online Banking. [Citation Graph (, )][DBLP]


  63. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. [Citation Graph (, )][DBLP]


  64. Chip and PIN is Broken. [Citation Graph (, )][DBLP]


  65. Thinking Inside the Box: System-Level Failures of Tamper Proofing. [Citation Graph (, )][DBLP]


  66. Phish and Chips. [Citation Graph (, )][DBLP]


  67. The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP]


  68. The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP]


  69. Technical perspective - A chilly sense of security. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002