The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Frank Stajano: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Frank Stajano
    The Security Challenges of Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:1- [Conf]
  2. Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. Wassell, Frank Stajano
    Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:157-165 [Conf]
  3. Ford-Long Wong, Frank Stajano
    Location Privacy in Bluetooth. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:176-188 [Conf]
  4. Kasim Rehman, Frank Stajano, George Coulouris
    Visually Interactive Location-Aware Computing. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2005, pp:177-194 [Conf]
  5. Frank Stajano
    Security for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:2- [Conf]
  6. Frank Stajano, Ross J. Anderson
    The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:434-447 [Conf]
  7. Frank Stajano
    Security for Whom?: The Shifting Security Assumptions of Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:16-27 [Conf]
  8. Alastair R. Beresford, Frank Stajano
    Mix Zones: User Privacy in Location-aware Services. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:127-131 [Conf]
  9. Ford-Long Wong, Frank Stajano
    Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:246-250 [Conf]
  10. Frank Stajano
    Security in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:6-8 [Conf]
  11. Frank Stajano
    One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:51-64 [Conf]
  12. Frank Stajano
    One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:65-67 [Conf]
  13. Frank Stajano
    The Resurrecting Duckling - What Next? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:204-214 [Conf]
  14. Frank Stajano
    The Resurrecting Duckling - What Next? (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:215-222 [Conf]
  15. Frank Stajano, Ross J. Anderson
    The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:172-194 [Conf]
  16. Pablo Vidales, Glenford E. Mapp, Frank Stajano, Jon Crowcroft, Carlos Jesus Bernardos
    A Practical Approach for 4G Systems: Deployment of Overlay Networks. [Citation Graph (0, 0)][DBLP]
    TRIDENTCOM, 2005, pp:172-181 [Conf]
  17. Tatsuo Nakajima, Hiro Ishikawa, Eiji Tokunaga, Frank Stajano
    Technology Challenges for Building Internet-Scale Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    WORDS, 2002, pp:171-179 [Conf]
  18. Frank Stajano
    Will your digital butlers betray you? [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:37-38 [Conf]
  19. Kasim Rehman, Frank Stajano, George Coulouris
    Interfacing with the invisible computer. [Citation Graph (0, 0)][DBLP]
    NordiCHI, 2002, pp:213-216 [Conf]
  20. Ross J. Anderson, Frank Stajano, Jong-Hyeon Lee
    Security policies. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2001, v:55, n:, pp:186-237 [Journal]
  21. Frank Stajano
    RFID is x-ray vision. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:9, pp:31-33 [Journal]
  22. Joonwoong Kim, Alastair R. Beresford, Frank Stajano
    Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper). [Citation Graph (0, 0)][DBLP]
    ICUCT, 2006, pp:263-272 [Conf]

  23. Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  24. Multichannel Protocols to Prevent Relay Attacks. [Citation Graph (, )][DBLP]


  25. Privacy-enabling social networking over untrusted networks. [Citation Graph (, )][DBLP]


  26. Repairing the Bluetooth Pairing Protocol. [Citation Graph (, )][DBLP]


  27. Multi-channel Protocols. [Citation Graph (, )][DBLP]


  28. Implementing a Multi-hat PDA. [Citation Graph (, )][DBLP]


  29. Repairing the Bluetooth Pairing Protocol. [Citation Graph (, )][DBLP]


  30. Usability of Security Management: Defining the Permissions of Guests. [Citation Graph (, )][DBLP]


  31. Forensic genomics: kin privacy, driftnets and other open questions. [Citation Graph (, )][DBLP]


  32. Privacy stories: confidence in privacy behaviors through end user programming. [Citation Graph (, )][DBLP]


  33. Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks. [Citation Graph (, )][DBLP]


  34. Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure. [Citation Graph (, )][DBLP]


Search in 0.009secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002