Search the dblp DataBase
Frank Stajano :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Frank Stajano The Security Challenges of Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:1- [Conf ] Ford-Long Wong , Min Lin , Shishir Nagaraja , Ian J. Wassell , Frank Stajano Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern. [Citation Graph (0, 0)][DBLP ] CNSR, 2007, pp:157-165 [Conf ] Ford-Long Wong , Frank Stajano Location Privacy in Bluetooth. [Citation Graph (0, 0)][DBLP ] ESAS, 2005, pp:176-188 [Conf ] Kasim Rehman , Frank Stajano , George Coulouris Visually Interactive Location-Aware Computing. [Citation Graph (0, 0)][DBLP ] Ubicomp, 2005, pp:177-194 [Conf ] Frank Stajano Security for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:2- [Conf ] Frank Stajano , Ross J. Anderson The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:434-447 [Conf ] Frank Stajano Security for Whom?: The Shifting Security Assumptions of Pervasive Computing. [Citation Graph (0, 0)][DBLP ] ISSS, 2002, pp:16-27 [Conf ] Alastair R. Beresford , Frank Stajano Mix Zones: User Privacy in Location-aware Services. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2004, pp:127-131 [Conf ] Ford-Long Wong , Frank Stajano Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2006, pp:246-250 [Conf ] Frank Stajano Security in Pervasive Computing. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:6-8 [Conf ] Frank Stajano One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:51-64 [Conf ] Frank Stajano One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:65-67 [Conf ] Frank Stajano The Resurrecting Duckling - What Next? [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:204-214 [Conf ] Frank Stajano The Resurrecting Duckling - What Next? (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:215-222 [Conf ] Frank Stajano , Ross J. Anderson The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:172-194 [Conf ] Pablo Vidales , Glenford E. Mapp , Frank Stajano , Jon Crowcroft , Carlos Jesus Bernardos A Practical Approach for 4G Systems: Deployment of Overlay Networks. [Citation Graph (0, 0)][DBLP ] TRIDENTCOM, 2005, pp:172-181 [Conf ] Tatsuo Nakajima , Hiro Ishikawa , Eiji Tokunaga , Frank Stajano Technology Challenges for Building Internet-Scale Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] WORDS, 2002, pp:171-179 [Conf ] Frank Stajano Will your digital butlers betray you? [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:37-38 [Conf ] Kasim Rehman , Frank Stajano , George Coulouris Interfacing with the invisible computer. [Citation Graph (0, 0)][DBLP ] NordiCHI, 2002, pp:213-216 [Conf ] Ross J. Anderson , Frank Stajano , Jong-Hyeon Lee Security policies. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 2001, v:55, n:, pp:186-237 [Journal ] Frank Stajano RFID is x-ray vision. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:9, pp:31-33 [Journal ] Joonwoong Kim , Alastair R. Beresford , Frank Stajano Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper). [Citation Graph (0, 0)][DBLP ] ICUCT, 2006, pp:263-272 [Conf ] Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Multichannel Protocols to Prevent Relay Attacks. [Citation Graph (, )][DBLP ] Privacy-enabling social networking over untrusted networks. [Citation Graph (, )][DBLP ] Repairing the Bluetooth Pairing Protocol. [Citation Graph (, )][DBLP ] Multi-channel Protocols. [Citation Graph (, )][DBLP ] Implementing a Multi-hat PDA. [Citation Graph (, )][DBLP ] Repairing the Bluetooth Pairing Protocol. [Citation Graph (, )][DBLP ] Usability of Security Management: Defining the Permissions of Guests. [Citation Graph (, )][DBLP ] Forensic genomics: kin privacy, driftnets and other open questions. [Citation Graph (, )][DBLP ] Privacy stories: confidence in privacy behaviors through end user programming. [Citation Graph (, )][DBLP ] Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks. [Citation Graph (, )][DBLP ] Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure. [Citation Graph (, )][DBLP ] Search in 0.037secs, Finished in 0.039secs