Search the dblp DataBase
Ross J. Anderson :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ross J. Anderson Why Information Security is Hard-An Economic Perspective. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:358-365 [Conf ] Ross J. Anderson How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering). [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:1-0 [Conf ] Ross J. Anderson , Eli Biham , Lars R. Knudsen The Case for Serpent. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:349-354 [Conf ] Ross J. Anderson , Serge Vaudenay Minding your p's and q`s. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:26-35 [Conf ] Simon W. Moore , Robert D. Mullins , Paul A. Cunningham , Ross J. Anderson , George S. Taylor Improving Smart Card Security Using Self-Timed Circuits. [Citation Graph (0, 0)][DBLP ] ASYNC, 2002, pp:211-0 [Conf ] Ross J. Anderson , Eli Biham , Lars R. Knudsen Serpent and Smartcards. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:246-253 [Conf ] Ross J. Anderson Why Cryptosystems Fail. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:215-227 [Conf ] Ross J. Anderson Protecting Embedded Systems - The Next Ten Years. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:1-2 [Conf ] Sergei P. Skorobogatov , Ross J. Anderson Optical Fault Induction Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:2-12 [Conf ] Ross J. Anderson Crypto in Europe - Markets, Law and Policy. [Citation Graph (0, 0)][DBLP ] Cryptography: Policy and Algorithms, 1995, pp:75-89 [Conf ] Ross J. Anderson , Roger M. Needham Robustness Principles for Public Key Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:236-247 [Conf ] Ross J. Anderson UEPS - A Second Generation Electronic Wallet. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:411-418 [Conf ] George Danezis , Chris Lesniewski-Laas , M. Frans Kaashoek , Ross J. Anderson Sybil-Resistant DHT Routing. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:305-318 [Conf ] Ross J. Anderson Liability and Computer Security: Nine Principles. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:231-245 [Conf ] Ross J. Anderson On the Security of Digital Tachographs. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:111-125 [Conf ] Ross J. Anderson , Michael Roe The GCHQ Protocol and Its Problems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:134-148 [Conf ] Ross J. Anderson A Modern Rotor Machine. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:47-50 [Conf ] Ross J. Anderson Searching for the Optimum Correlation Attack. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:137-143 [Conf ] Ross J. Anderson On Fibonacci Keystream Generators. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:346-352 [Conf ] Ross J. Anderson , Eli Biham TIGER: A Fast New Hash Function. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:89-97 [Conf ] Ross J. Anderson , Eli Biham Two Practical and Provably Secure Block Ciphers: BEARS and LION. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:113-120 [Conf ] Ross J. Anderson , Charalampos Manifavas Chameleon - A New Kind of Stream Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:107-113 [Conf ] Eli Biham , Ross J. Anderson , Lars R. Knudsen Serpent: A New Block Cipher Proposal. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:222-238 [Conf ] Fabien A. P. Petitcolas , Ross J. Anderson Evaluation of Copyright Marking Systems. [Citation Graph (0, 0)][DBLP ] ICMCS, Vol. 1, 1999, pp:574-579 [Conf ] Ross J. Anderson , Haowen Chan , Adrian Perrig Key Infection: Smart Trust for Smart Dust. [Citation Graph (0, 0)][DBLP ] ICNP, 2004, pp:206-215 [Conf ] Ross J. Anderson Stretching the Limits of Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:39-48 [Conf ] Ross J. Anderson , Roger M. Needham , Adi Shamir The Steganographic File System. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:73-82 [Conf ] Ross J. Anderson , Serge Vaudenay , Bart Preneel , Kaisa Nyberg The Newton Channel. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:151-156 [Conf ] Markus G. Kuhn , Ross J. Anderson Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:124-142 [Conf ] Fabien A. P. Petitcolas , Ross J. Anderson , Markus G. Kuhn Attacks on Copyright Marking Systems. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:218-238 [Conf ] Frank Stajano , Ross J. Anderson The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:434-447 [Conf ] Ross J. Anderson Cryptography and competition policy: issues with 'trusted computing'. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:3-10 [Conf ] David Samyde , Sergei P. Skorobogatov , Ross J. Anderson , Jean-Jacques Quisquater On a New Way to Read Data from Memory. [Citation Graph (0, 0)][DBLP ] IEEE Security in Storage Workshop, 2002, pp:65-69 [Conf ] Ross J. Anderson Privacy Technology Lessons from Healthcare. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:78-79 [Conf ] Ross J. Anderson A Security Policy Model for Clinical Information Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:30-43 [Conf ] Ross J. Anderson The Correctness of Crypto Transaction Sets. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:125-127 [Conf ] Ross J. Anderson The Correctness of Crypto Transaction Sets (Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:128-141 [Conf ] Ross J. Anderson What We Can Learn from API Security. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:288-300 [Conf ] Ross J. Anderson , Markus G. Kuhn Low Cost Attacks on Tamper Resistant Devices. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:125-136 [Conf ] Ross J. Anderson , Jong-Hyeon Lee Jikzi: A New Framework for Secure Publishing. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:21-47 [Conf ] Ross J. Anderson , Václav Matyás Jr. , Fabien A. P. Petitcolas , Iain E. Buchan , Rudolf Hanka Secure Books: Protecting the Distribution of Knowledge. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:1-11 [Conf ] Ross J. Anderson , Charalampos Manifavas , Chris Sutherland NetCard - A Practical Electronic-Cash System. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:49-57 [Conf ] Michael Roe , Ross J. Anderson , William S. Harbison , T. Mark A. Lomas Government Access to Keys - Panel Discussion. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:62-73 [Conf ] Frank Stajano , Ross J. Anderson The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:172-194 [Conf ] Ross J. Anderson , Frank Stajano , Jong-Hyeon Lee Security policies. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 2001, v:55, n:, pp:186-237 [Journal ] Ross J. Anderson Free speech online and offline. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2002, v:45, n:6, pp:120- [Journal ] Ross J. Anderson Why Cryptosystems Fail. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1994, v:37, n:11, pp:32-40 [Journal ] Ross J. Anderson , Jong-Hyeon Lee Jikzi - a new framework for security policy, trusted publishing and electronic commerce. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:17, pp:1621-1626 [Journal ] Ross J. Anderson Free Speech Online and Offline. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:6, pp:28-30 [Journal ] Mike Bond , Ross J. Anderson API-Level Attacks on Embedded Systems. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2001, v:34, n:10, pp:67-75 [Journal ] Ross J. Anderson , Cunsheng Ding , Tor Helleseth , Torleiv Kløve How to Build Robust Shared Control Systems. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1998, v:15, n:2, pp:111-124 [Journal ] Ross J. Anderson , Bruce Schneier Guest Editors' Introduction: Economics of Information Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:12-13 [Journal ] George Danezis , Ross J. Anderson The Economics of Resisting Censorship. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:45-50 [Journal ] Jeff Jianxin Yan , Alan F. Blackwell , Ross J. Anderson , Alasdair Grant Password Memorability and Security: Empirical Results. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:5, pp:25-31 [Journal ] Ross J. Anderson Whither Cryptography. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1994, v:2, n:5, pp:13-20 [Journal ] Ross J. Anderson , Francesco Bergadano , Bruno Crispo , Jong-Hyeon Lee , Charalampos Manifavas , Roger M. Needham A New Family of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1998, v:32, n:4, pp:9-20 [Journal ] Ross J. Anderson , Terry Bollinger , Doug Brown , Enrique Draier , Philip Machanick , Gary McGraw , Nancy R. Mead , Arthur B. Pyster , Howard Schmidt , Timothy J. Shimeall Roundtable on Information Security Policy. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2000, v:17, n:5, pp:- [Journal ] Ross J. Anderson , S. Johann Bezuidenhoudt On the Reliability of Electronic Payment Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:294-301 [Journal ] Simon W. Moore , Ross J. Anderson , Robert D. Mullins , George S. Taylor , Jacques J. A. Fournier Balanced self-checking asynchronous logic for smart card applications. [Citation Graph (0, 0)][DBLP ] Microprocessors and Microsystems, 2003, v:27, n:9, pp:421-430 [Journal ] Security, Functionality and Scale? [Citation Graph (, )][DBLP ] Information Security Economics - and Beyond. [Citation Graph (, )][DBLP ] Optimised to Fail: Card Readers for Online Banking. [Citation Graph (, )][DBLP ] Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. [Citation Graph (, )][DBLP ] Chip and PIN is Broken. [Citation Graph (, )][DBLP ] Thinking Inside the Box: System-Level Failures of Tamper Proofing. [Citation Graph (, )][DBLP ] Phish and Chips. [Citation Graph (, )][DBLP ] The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP ] The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP ] Technical perspective - A chilly sense of security. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.013secs