The SCEAS System
Navigation Menu

Search the dblp DataBase


Richard Clayton: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard Clayton
    Stopping Spam by Extrusion Detection. [Citation Graph (0, 0)][DBLP]
    CEAS, 2004, pp:- [Conf]
  2. Richard Clayton
    Stopping Outgoing Spam by Examining Incoming Server Logs. [Citation Graph (0, 0)][DBLP]
    CEAS, 2005, pp:- [Conf]
  3. Richard Clayton, Mike Bond
    Experience Using a Low-Cost FPGA Design to Crack DES Keys. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:579-592 [Conf]
  4. Richard Clayton
    Who'd Phish from the Summit of Kilimanjaro?. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:91-92 [Conf]
  5. Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo
    A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:88- [Conf]
  6. Ekaterina Zhuchkova, Richard Clayton
    Methods for Identifying and Tracking Phase Singularities in Computational Models of Re-entrant Fibrillation. [Citation Graph (0, 0)][DBLP]
    FIMH, 2005, pp:246-255 [Conf]
  7. Richard Clayton, George Danezis
    Chaffinch: Confidentiality in the Face of Legal Threats. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:70-86 [Conf]
  8. Richard Clayton, George Danezis, Markus G. Kuhn
    Real World Patterns of Failure in Anonymity Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:230-244 [Conf]
  9. Richard Clayton
    Workshop Report for IPTPS'02: 1st International Workshop on Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:1-21 [Conf]
  10. Richard Clayton, Spencer Rugaber, Lyman Taylor, Linda M. Wills
    A Case Study of Domain-based Program Understanding. [Citation Graph (0, 0)][DBLP]
    WPC, 1997, pp:102-110 [Conf]
  11. Richard Clayton, Spencer Rugaber, Linda M. Wills
    Dowsing: A Tool Framework for Domain-Oriented Browsing of Software Artifacts. [Citation Graph (0, 0)][DBLP]
    ASE, 1998, pp:204-0 [Conf]
  12. George Danezis, Richard Clayton
    Route Fingerprinting in Anonymous Communications. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2006, pp:69-72 [Conf]
  13. Richard Clayton
    Improving Onion Notation. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2003, pp:81-87 [Conf]
  14. Richard Clayton
    Failures in a Hybrid Content Blocking System. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:78-92 [Conf]
  15. Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
    Ignoring the Great Firewall of China. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:20-35 [Conf]
  16. Richard Clayton, Spencer Rugaber, Linda M. Wills
    On the Knowledge Required to Understand a Program. [Citation Graph (0, 0)][DBLP]
    WCRE, 1998, pp:69-78 [Conf]
  17. Richard Clayton
    On twofold triple systems and their automorphism groups. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1987, v:46, n:2, pp:306-313 [Journal]

  18. Email traffic: a quantitative snapshot. [Citation Graph (, )][DBLP]

  19. Do Zebras get more Spam than Aardvarks? [Citation Graph (, )][DBLP]

  20. Using Early Results from the 'spamHINTS' Project to Estimate an ISP Abuse Team's Task. [Citation Graph (, )][DBLP]

  21. Evaluating the Wisdom of Crowds in Assessing Phishing Websites. [Citation Graph (, )][DBLP]

  22. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. [Citation Graph (, )][DBLP]

  23. Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). [Citation Graph (, )][DBLP]

  24. Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). [Citation Graph (, )][DBLP]

  25. Examining the impact of website take-down on phishing. [Citation Graph (, )][DBLP]

  26. Security Economics and European Policy. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002