| 2005 |
| 62 | EE | George Danezis,
Chris Lesniewski-Laas,
M. Frans Kaashoek,
Ross J. Anderson:
Sybil-Resistant DHT Routing.
ESORICS 2005: 305-318 |
| 61 | EE | Ross J. Anderson,
Bruce Schneier:
Guest Editors' Introduction: Economics of Information Security.
IEEE Security & Privacy 3(1): 12-13 (2005) |
| 60 | EE | George Danezis,
Ross J. Anderson:
The Economics of Resisting Censorship.
IEEE Security & Privacy 3(1): 45-50 (2005) |
| 2004 |
| 59 | EE | Ross J. Anderson,
Haowen Chan,
Adrian Perrig:
Key Infection: Smart Trust for Smart Dust.
ICNP 2004: 206-215 |
| 58 | EE | Jeff Jianxin Yan,
Alan F. Blackwell,
Ross J. Anderson,
Alasdair Grant:
Password Memorability and Security: Empirical Results.
IEEE Security & Privacy 2(5): 25-31 (2004) |
| 2003 |
| 57 | EE | Ross J. Anderson:
Cryptography and competition policy: issues with 'trusted computing'.
PODC 2003: 3-10 |
| 56 | EE | Ross J. Anderson:
What We Can Learn from API Security.
Security Protocols Workshop 2003: 288-300 |
| 55 | EE | Simon W. Moore,
Ross J. Anderson,
Robert D. Mullins,
George S. Taylor,
Jacques J. A. Fournier:
Balanced self-checking asynchronous logic for smart card applications.
Microprocessors and Microsystems 27(9): 421-430 (2003) |
| 2002 |
| 54 | EE | Simon W. Moore,
Robert D. Mullins,
Paul A. Cunningham,
Ross J. Anderson,
George S. Taylor:
Improving Smart Card Security Using Self-Timed Circuits.
ASYNC 2002: 211- |
| 53 | EE | Sergei P. Skorobogatov,
Ross J. Anderson:
Optical Fault Induction Attacks.
CHES 2002: 2-12 |
| 52 | EE | David Samyde,
Sergei P. Skorobogatov,
Ross J. Anderson,
Jean-Jacques Quisquater:
On a New Way to Read Data from Memory.
IEEE Security in Storage Workshop 2002: 65-69 |
| 51 | EE | Ross J. Anderson:
Free speech online and offline.
Commun. ACM 45(6): 120 (2002) |
| 50 | EE | Ross J. Anderson:
Free Speech Online and Offline.
IEEE Computer 35(6): 28-30 (2002) |
| 2001 |
| 49 | EE | Ross J. Anderson:
Why Information Security is Hard-An Economic Perspective.
ACSAC 2001: 358-365 |
| 48 | EE | Ross J. Anderson:
Protecting Embedded Systems - The Next Ten Years.
CHES 2001: 1-2 |
| 47 | | Ross J. Anderson,
Frank Stajano,
Jong-Hyeon Lee:
Security policies.
Advances in Computers 55: 186-237 (2001) |
| 46 | EE | Mike Bond,
Ross J. Anderson:
API-Level Attacks on Embedded Systems.
IEEE Computer 34(10): 67-75 (2001) |
| 2000 |
| 45 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
The Case for Serpent.
AES Candidate Conference 2000: 349-354 |
| 44 | EE | Ross J. Anderson:
Privacy Technology Lessons from Healthcare.
IEEE Symposium on Security and Privacy 2000: 78-79 |
| 43 | EE | Ross J. Anderson:
The Correctness of Crypto Transaction Sets.
Security Protocols Workshop 2000: 125-127 |
| 42 | EE | Ross J. Anderson:
The Correctness of Crypto Transaction Sets (Discussion).
Security Protocols Workshop 2000: 128-141 |
| 41 | EE | Michael Roe,
Ross J. Anderson,
William S. Harbison,
T. Mark A. Lomas:
Government Access to Keys - Panel Discussion.
Security Protocols Workshop 2000: 62-73 |
| 40 | EE | Ross J. Anderson,
Jong-Hyeon Lee:
Jikzi - a new framework for security policy, trusted publishing and electronic commerce.
Computer Communications 23(17): 1621-1626 (2000) |
| 39 | EE | Ross J. Anderson,
Terry Bollinger,
Doug Brown,
Enrique Draier,
Philip Machanick,
Gary McGraw,
Nancy R. Mead,
Arthur B. Pyster,
Howard Schmidt,
Timothy J. Shimeall:
Roundtable on Information Security Policy.
IEEE Software 17(5): (2000) |
| 1999 |
| 38 | EE | Ross J. Anderson:
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering).
ACSAC 1999: 1- |
| 37 | EE | Fabien A. P. Petitcolas,
Ross J. Anderson:
Evaluation of Copyright Marking Systems.
ICMCS, Vol. 1 1999: 574-579 |
| 36 | | Frank Stajano,
Ross J. Anderson:
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast.
Information Hiding 1999: 434-447 |
| 35 | | Frank Stajano,
Ross J. Anderson:
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.
Security Protocols Workshop 1999: 172-194 |
| 34 | | Ross J. Anderson,
Jong-Hyeon Lee:
Jikzi: A New Framework for Secure Publishing.
Security Protocols Workshop 1999: 21-47 |
| 1998 |
| 33 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
Serpent and Smartcards.
CARDIS 1998: 246-253 |
| 32 | EE | Ross J. Anderson:
On the Security of Digital Tachographs.
ESORICS 1998: 111-125 |
| 31 | EE | Eli Biham,
Ross J. Anderson,
Lars R. Knudsen:
Serpent: A New Block Cipher Proposal.
FSE 1998: 222-238 |
| 30 | EE | Markus G. Kuhn,
Ross J. Anderson:
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.
Information Hiding 1998: 124-142 |
| 29 | EE | Fabien A. P. Petitcolas,
Ross J. Anderson,
Markus G. Kuhn:
Attacks on Copyright Marking Systems.
Information Hiding 1998: 218-238 |
| 28 | EE | Ross J. Anderson,
Roger M. Needham,
Adi Shamir:
The Steganographic File System.
Information Hiding 1998: 73-82 |
| 27 | | Ross J. Anderson,
Cunsheng Ding,
Tor Helleseth,
Torleiv Kløve:
How to Build Robust Shared Control Systems.
Des. Codes Cryptography 15(2): 111-124 (1998) |
| 26 | | Ross J. Anderson,
Francesco Bergadano,
Bruno Crispo,
Jong-Hyeon Lee,
Charalampos Manifavas,
Roger M. Needham:
A New Family of Authentication Protocols.
Operating Systems Review 32(4): 9-20 (1998) |
| 1997 |
| 25 | EE | Ross J. Anderson,
Michael Roe:
The GCHQ Protocol and Its Problems.
EUROCRYPT 1997: 134-148 |
| 24 | EE | Ross J. Anderson,
Charalampos Manifavas:
Chameleon - A New Kind of Stream Cipher.
FSE 1997: 107-113 |
| 23 | | Ross J. Anderson,
Václav Matyás Jr.,
Fabien A. P. Petitcolas,
Iain E. Buchan,
Rudolf Hanka:
Secure Books: Protecting the Distribution of Knowledge.
Security Protocols Workshop 1997: 1-11 |
| 22 | | Ross J. Anderson,
Markus G. Kuhn:
Low Cost Attacks on Tamper Resistant Devices.
Security Protocols Workshop 1997: 125-136 |
| 1996 |
| 21 | | Ross J. Anderson:
Information Hiding, First International Workshop, Cambridge, U.K., May 30 - June 1, 1996, Proceedings
Springer 1996 |
| 20 | | Ross J. Anderson,
Serge Vaudenay:
Minding your p's and q`s.
ASIACRYPT 1996: 26-35 |
| 19 | | Ross J. Anderson,
Eli Biham:
Two Practical and Provably Secure Block Ciphers: BEARS and LION.
FSE 1996: 113-120 |
| 18 | | Ross J. Anderson,
Eli Biham:
TIGER: A Fast New Hash Function.
FSE 1996: 89-97 |
| 17 | EE | Ross J. Anderson:
A Security Policy Model for Clinical Information Systems.
IEEE Symposium on Security and Privacy 1996: 30-43 |
| 16 | | Ross J. Anderson,
Serge Vaudenay,
Bart Preneel,
Kaisa Nyberg:
The Newton Channel.
Information Hiding 1996: 151-156 |
| 15 | | Ross J. Anderson:
Stretching the Limits of Steganography.
Information Hiding 1996: 39-48 |
| 14 | | Ross J. Anderson,
Charalampos Manifavas,
Chris Sutherland:
NetCard - A Practical Electronic-Cash System.
Security Protocols Workshop 1996: 49-57 |
| 13 | EE | Ross J. Anderson,
S. Johann Bezuidenhoudt:
On the Reliability of Electronic Payment Systems.
IEEE Trans. Software Eng. 22(5): 294-301 (1996) |
| 1995 |
| 12 | EE | Ross J. Anderson,
Roger M. Needham:
Robustness Principles for Public Key Protocols.
CRYPTO 1995: 236-247 |
| 11 | | Ross J. Anderson:
Crypto in Europe - Markets, Law and Policy.
Cryptography: Policy and Algorithms 1995: 75-89 |
| 10 | | Ross J. Anderson,
Roger M. Needham:
Programming Satan's Computer.
Computer Science Today 1995: 426-440 |
| 1994 |
| 9 | | Ross J. Anderson:
Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings
Springer 1994 |
| 8 | EE | Ross J. Anderson:
Liability and Computer Security: Nine Principles.
ESORICS 1994: 231-245 |
| 7 | | Ross J. Anderson:
Searching for the Optimum Correlation Attack.
FSE 1994: 137-143 |
| 6 | | Ross J. Anderson:
On Fibonacci Keystream Generators.
FSE 1994: 346-352 |
| 5 | | Ross J. Anderson:
Why Cryptosystems Fail.
Commun. ACM 37(11): 32-40 (1994) |
| 4 | EE | Ross J. Anderson:
Whither Cryptography.
Inf. Manag. Comput. Security 2(5): 13-20 (1994) |
| 1993 |
| 3 | EE | Ross J. Anderson:
Why Cryptosystems Fail.
ACM Conference on Computer and Communications Security 1993: 215-227 |
| 2 | | Ross J. Anderson:
A Modern Rotor Machine.
FSE 1993: 47-50 |
| 1992 |
| 1 | EE | Ross J. Anderson:
UEPS - A Second Generation Electronic Wallet.
ESORICS 1992: 411-418 |