The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mike Bond: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mike Bond, Jolyon Clulow
    Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure). [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:140-151 [Conf]
  2. Mike Bond
    Attacks on Cryptoprocessor Transaction Sets. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:220-234 [Conf]
  3. Richard Clayton, Mike Bond
    Experience Using a Low-Cost FPGA Design to Crack DES Keys. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:579-592 [Conf]
  4. Mike Bond, Ross J. Anderson
    API-Level Attacks on Embedded Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:10, pp:67-75 [Journal]
  5. Mike Bond, Jolyon Clulow
    Extending Security Protocol Analysis: New Challenges. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:13-24 [Journal]
  6. Mike Bond, George Danezis
    A pact with the devil. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:77-82 [Conf]

  7. Leaving Room for the Bad Guys. [Citation Graph (, )][DBLP]


  8. Virtual Economies: Threats and Risks. [Citation Graph (, )][DBLP]


  9. Chip and PIN is Broken. [Citation Graph (, )][DBLP]


  10. The Dining Freemasons (Security Protocols for Secret Societies). [Citation Graph (, )][DBLP]


  11. The Dining Freemasons (Security Protocols for Secret Societies). [Citation Graph (, )][DBLP]


  12. Phish and Chips. [Citation Graph (, )][DBLP]


  13. The Man-in-the-Middle Defence. [Citation Graph (, )][DBLP]


  14. Phish and Chips. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002